Extracting prog: 6m29.730371503s Minimizing prog: 1h50m47.954652324s Simplifying prog options: 0s Extracting C: 8m39.693222658s Simplifying C: 58m31.748927988s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0xffffffffffffff0d) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200000002"], 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0xffffffffffffff0d) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200000002"], 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0xffffffffffffff0d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0xffffffffffffff0d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0xffffffffffffff0d) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h4m29.127216472s repro crashed as (corrupted=false): INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:83236c00 r4:83236c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b89700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2178c r4:84b21400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b2178c r4:830b8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236c00 r8:830b852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027f5e8 r7:df83de60 r6:830b8600 r5:83236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830b7180 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ccf1d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/0:2:44 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:44 tgid:44 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df915d84 r8:00000002 r7:60000113 r6:df915d8c r5:833a3000 r4:833a3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df915e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b3c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e878c r4:857e8400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e878c r4:83363900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a3000 r8:8336392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83363900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363900 r8:8027f5e8 r7:df841e60 r6:83363a00 r5:833a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf915fb0 to 0xdf915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83367000 INFO: task kworker/0:2:44 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd0fd000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:5:3117 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:84115400 r4:84115400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84115400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84115400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa15000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502738c r4:85027000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502738c r4:849e6f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84115400 r8:849e6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6f80 r8:8027f5e8 r7:df9d5e60 r6:849d8d00 r5:84115400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849f9b40 INFO: task kworker/1:5:3117 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd581000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:6:3118 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:83238c00 r4:83238c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7de00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83238c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa91000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1f8c r4:84ab1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1f8c r4:849e6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238c00 r8:849e6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6d80 r8:8027f5e8 r7:df9e5e60 r6:849d8e80 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849f9ac0 INFO: task kworker/1:6:3118 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd94c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:7:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:838d6c00 r4:838d6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838d6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df883000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab2b8c r4:84ab2800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab2b8c r4:849e6e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838d6c00 r8:849e6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6e00 r8:8027f5e8 r7:df9e5e60 r6:849d8800 r5:838d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849f9e80 INFO: task kworker/1:7:3120 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd94c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:8:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df979d84 r8:00000002 r7:60000113 r6:df979d8c r5:84533000 r4:84533000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84533000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0d80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84533000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e026f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae3b8c r4:84ae3800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae3b8c r4:849e6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84533000 r8:849e6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6d00 r8:8027f5e8 r7:df9e5e60 r6:849e6c80 r5:84533000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb000 INFO: task kworker/1:8:3122 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cdcef000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/0:0:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9c9d84 r8:00000002 r7:60000113 r6:df9c9d8c r5:84530c00 r4:84530c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84530c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bdc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84530c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec383000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e7b8c r4:857e7800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e7b8c r4:849d8e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84530c00 r8:849d8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849d8e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849d8e00 r8:8027f5e8 r7:df841e60 r6:849e6c00 r5:84530c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c9fb0 to 0xdf9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fb4800 INFO: task kworker/0:0:3123 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ce45e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:9:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:84532400 r4:84532400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84532400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84532400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa95000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508c78c r4:8508c400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508c78c r4:849e6b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84532400 r8:849e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6b00 r8:8027f5e8 r7:df9e5e60 r6:849e6b80 r5:84532400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb1c0 INFO: task kworker/1:9:3126 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ce45e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:10:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:84164800 r4:84164800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84164800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85129340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84164800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85024f8c r4:85024c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85024f8c r4:849e6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84164800 r8:849e69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6980 r8:8027f5e8 r7:df9e5e60 r6:849e6a00 r5:84164800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb1c0 INFO: task kworker/1:10:3127 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ce80f000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/0:3:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:84162400 r4:84162400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84162400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84162400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e638c r4:857e6000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e638c r4:849d8700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84162400 r8:849d872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849d8700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849d8700 r8:8027f5e8 r7:df9c9e60 r6:849e6a80 r5:84162400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fb4b80 INFO: task kworker/0:3:3130 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ced77000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3132 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:83244800 r4:83244800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83244800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521ab40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517238c r4:85172000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517238c r4:849e6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83244800 r8:849e66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6680 r8:8027f5e8 r7:df9e5e60 r6:849e6900 r5:83244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb500 INFO: task kworker/1:11:3132 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cf2b0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3133 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83242400 r4:83242400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46bf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85027f8c r4:85027c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85027f8c r4:849e6880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:849e68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6880 r8:8027f5e8 r7:dfa21e60 r6:849e6800 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb580 INFO: task kworker/1:12:3133 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cf67e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83a4bc00 r4:83a4bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a4bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fe40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517478c r4:85174400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517478c r4:849e6780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a4bc00 r8:849e67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6780 r8:8027f5e8 r7:dfa3de60 r6:849e6580 r5:83a4bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb9c0 INFO: task kworker/1:13:3135 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cfd29000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3137 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83a48000 r4:83a48000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a48000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361740 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a48000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a0000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e438c r4:844e4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e438c r4:849e6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a48000 r8:849e662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6600 r8:8027f5e8 r7:dfa3de60 r6:849e6500 r5:83a48000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb900 INFO: task kworker/1:14:3137 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d0343000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3139 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83a4a400 r4:83a4a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a4a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fbcc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533a78c r4:8533a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533a78c r4:849e6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a4a400 r8:849e64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6480 r8:8027f5e8 r7:dfa55e60 r6:849e6400 r5:83a4a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb900 INFO: task kworker/1:15:3139 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d08b2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3141 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:83b7e000 r4:83b7e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b7e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d1b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533bf8c r4:8533bc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533bf8c r4:849e6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b7e000 r8:849e63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6380 r8:8027f5e8 r7:dfa61e60 r6:849d8c00 r5:83b7e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbdc0 INFO: task kworker/1:16:3141 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d0c4d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3143 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83b7bc00 r4:83b7bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b7bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ff2c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e4f8c r4:844e4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e4f8c r4:849e6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b7bc00 r8:849e632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6300 r8:8027f5e8 r7:dfa61e60 r6:849d8f80 r5:83b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbd80 INFO: task kworker/1:17:3143 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d102c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3145 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83b79800 r4:83b79800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b79800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b79800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535a38c r4:8535a000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535a38c r4:849e6200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b79800 r8:849e622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6200 r8:8027f5e8 r7:dfa8de60 r6:83bcde00 r5:83b79800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbe80 INFO: task kworker/1:18:3145 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d1220000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83b78c00 r4:83b78c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b78c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ff340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e538c r4:844e5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e538c r4:849e6280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b78c00 r8:849e62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6280 r8:8027f5e8 r7:dfa99e60 r6:83ad6800 r5:83b78c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917080 INFO: task kworker/1:19:3146 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d159b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:84560000 r4:84560000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84560000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854acb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84560000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c4f8c r4:854c4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c4f8c r4:849e6180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84560000 r8:849e61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6180 r8:8027f5e8 r7:dfa99e60 r6:849e6100 r5:84560000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917200 INFO: task kworker/1:20:3148 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d1c65000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:84566000 r4:84566000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84566000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512b440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84566000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e4b8c r4:850e4800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e4b8c r4:849e6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84566000 r8:849e60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6080 r8:8027f5e8 r7:dfa99e60 r6:849e6000 r5:84566000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917340 INFO: task kworker/1:21:3150 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d1f4c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3152 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:84564800 r4:84564800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84564800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85551340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84564800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea999000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ebb8c r4:854eb800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ebb8c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84564800 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:dfa79e60 r6:830b8400 r5:84564800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917340 INFO: task kworker/1:22:3152 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d27e1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3154 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:84563c00 r4:84563c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84563c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849175c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84563c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85540f8c r4:85540c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85540f8c r4:830b8780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84563c00 r8:830b87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027f5e8 r7:dfa79e60 r6:830b8700 r5:84563c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849175c0 INFO: task kworker/1:23:3154 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d29ef000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3157 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:84560c00 r4:84560c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84560c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84560c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadfd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554178c r4:85541400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554178c r4:8427d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84560c00 r8:8427d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8427d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8427d880 r8:8027f5e8 r7:dfa79e60 r6:8427d800 r5:84560c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917240 INFO: task kworker/1:24:3157 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d29ef000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3160 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:84566c00 r4:84566c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84566c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856762c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84566c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85541f8c r4:85541c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85541f8c r4:84076900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84566c00 r8:8407692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84076900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84076900 r8:8027f5e8 r7:dfa79e60 r6:84076b00 r5:84566c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917dc0 INFO: task kworker/1:25:3160 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d304a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:84563000 r4:84563000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84563000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e0380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84563000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554278c r4:85542400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554278c r4:832c8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84563000 r8:832c82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832c8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832c8280 r8:8027f5e8 r7:dfa79e60 r6:832c8200 r5:84563000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:26:3161 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d33aa000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84562400 r4:84562400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84562400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84562400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e678c r4:844e6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e678c r4:8442e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84562400 r8:8442e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8442e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8442e080 r8:8027f5e8 r7:dfa79e60 r6:8442e000 r5:84562400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917f80 INFO: task kworker/1:27:3163 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d33aa000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3165 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:8415d400 r4:8415d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8415d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8415d400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9df000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e5b8c r4:850e5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e5b8c r4:8441bf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8415d400 r8:8441bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8441bf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8441bf80 r8:8027f5e8 r7:dfa79e60 r6:8441bf00 r5:8415d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856000 INFO: task kworker/1:28:3165 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d36b4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:8415e000 r4:8415e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8415e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8415e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e4b8c r4:857e4800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e4b8c r4:83ad8300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8415e000 r8:83ad832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ad8300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ad8300 r8:8027f5e8 r7:dfae9e60 r6:83ad8a80 r5:8415e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856240 INFO: task kworker/1:29:3167 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d36b4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3169 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:84158c00 r4:84158c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84158c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84158c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e578c r4:850e5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e578c r4:830cd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84158c00 r8:830cd42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd400 r8:8027f5e8 r7:dfae9e60 r6:830cd380 r5:84158c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856240 INFO: task kworker/1:30:3169 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d36b4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84023000 r4:84023000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84023000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84023000 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e638c r4:850e6000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e638c r4:830cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84023000 r8:830cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027f5e8 r7:dfae9e60 r6:8483d000 r5:84023000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856380 INFO: task kworker/1:31:3171 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:84025400 r4:84025400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84025400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84025400 r7:00000000 r6:83018200 r5:00001000 r4:7f139000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85808b8c r4:85808800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85808b8c r4:8483d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84025400 r8:8483d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d080 r8:8027f5e8 r7:dfb25e60 r6:8483d100 r5:84025400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848564c0 INFO: task kworker/1:32:3174 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:84026c00 r4:84026c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84026c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac9c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84026c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e6b8c r4:850e6800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e6b8c r4:8483d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84026c00 r8:8483d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d180 r8:8027f5e8 r7:dfb31e60 r6:8483d200 r5:84026c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848565c0 INFO: task kworker/1:33:3175 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb3dd84 r8:00000002 r7:60000013 r6:dfb3dd8c r5:84026000 r4:84026000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84026000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84026000 r7:00000000 r6:83018200 r5:00001000 r4:7f317000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec527000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84886b8c r4:84886800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84886b8c r4:8483d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84026000 r8:8483d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d280 r8:8027f5e8 r7:dfb49e60 r6:8483d300 r5:84026000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856740 INFO: task kworker/1:34:3177 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83a62400 r4:83a62400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a62400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3d1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8488778c r4:84887400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488778c r4:8483d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a62400 r8:8483d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d380 r8:8027f5e8 r7:dfb3de60 r6:8483d400 r5:83a62400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856b40 INFO: task kworker/1:35:3179 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d40a1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3180 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:83a60c00 r4:83a60c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a60c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f315000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec483000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84886f8c r4:84886c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84886f8c r4:8483d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a60c00 r8:8483d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d480 r8:8027f5e8 r7:dfb55e60 r6:8483d500 r5:83a60c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856b40 INFO: task kworker/1:36:3180 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d40a1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:838eb000 r4:838eb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838eb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f2ff000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ecf8c r4:848ecc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ecf8c r4:8483d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838eb000 r8:8483d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d580 r8:8027f5e8 r7:dfb55e60 r6:8483d600 r5:838eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856d40 INFO: task kworker/1:37:3184 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d446a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb7dd84 r8:00000002 r7:60000013 r6:dfb7dd8c r5:838ed400 r4:838ed400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838ed400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f311000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec357000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8488738c r4:84887000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488738c r4:8483d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838ed400 r8:8483d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d680 r8:8027f5e8 r7:dfb61e60 r6:8483d700 r5:838ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c080 INFO: task kworker/1:38:3185 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d446a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:8448ec00 r4:8448ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f30d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84887f8c r4:84887c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84887f8c r4:8483d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448ec00 r8:8483d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d780 r8:8027f5e8 r7:dfb7de60 r6:8483d800 r5:8448ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c180 INFO: task kworker/1:39:3186 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4b48000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:84488c00 r4:84488c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84488c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84488c00 r7:00000000 r6:83018200 r5:00001000 r4:7f30f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84887b8c r4:84887800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84887b8c r4:8483d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84488c00 r8:8483d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d880 r8:8027f5e8 r7:dfb71e60 r6:8483d900 r5:84488c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c340 INFO: task kworker/1:40:3188 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4cc2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:8448e000 r4:8448e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84134600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448e000 r7:00000000 r6:83018200 r5:00001000 r4:7f30b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead83000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84885f8c r4:84885c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84885f8c r4:8483d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448e000 r8:8483d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d980 r8:8027f5e8 r7:dfb71e60 r6:8483da00 r5:8448e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c500 INFO: task kworker/1:41:3191 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4cc2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:8448d400 r4:8448d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448d400 r7:00000000 r6:83018200 r5:00001000 r4:7f301000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ed38c r4:848ed000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ed38c r4:8483da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448d400 r8:8483daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483da80 r8:8027f5e8 r7:dfbade60 r6:8483db00 r5:8448d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c140 INFO: task kworker/1:42:3193 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4fc1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:8448c800 r4:8448c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448c800 r7:00000000 r6:83018200 r5:00001000 r4:7f307000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec78c r4:848ec400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ec78c r4:8483db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448c800 r8:8483dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483db80 r8:8027f5e8 r7:dfbb9e60 r6:8483dc00 r5:8448c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c140 INFO: task kworker/1:43:3194 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5345000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3197 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:8448b000 r4:8448b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e70c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448b000 r7:00000000 r6:83018200 r5:00001000 r4:7f309000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc7f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec38c r4:848ec000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ec38c r4:8483dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448b000 r8:8483dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483dc80 r8:8027f5e8 r7:dfbb9e60 r6:8483dd00 r5:8448b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417cb00 INFO: task kworker/1:44:3197 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5345000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbd9d84 r8:00000002 r7:60000013 r6:dfbd9d8c r5:84489800 r4:84489800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84489800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84489800 r7:00000000 r6:83018200 r5:00001000 r4:7f305000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ed78c r4:848ed400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ed78c r4:8483dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84489800 r8:8483ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483dd80 r8:8027f5e8 r7:dfbb9e60 r6:8483de00 r5:84489800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417ccc0 INFO: task kworker/1:45:3199 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5345000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:8448bc00 r4:8448bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e78c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f303000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb955000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848edb8c r4:848ed800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848edb8c r4:8483de80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448bc00 r8:8483deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483de80 r8:8027f5e8 r7:dfbb9e60 r6:8483df00 r5:8448bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417cf00 INFO: task kworker/1:46:3200 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5549000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbf1d84 r8:00000002 r7:60000013 r6:dfbf1d8c r5:84144800 r4:84144800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84144800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85586380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84144800 r7:00000000 r6:83018200 r5:00001000 r4:7f227000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba07000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ceb8c r4:858ce800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ceb8c r4:8483df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84144800 r8:8483dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483df80 r8:8027f5e8 r7:dfbb9e60 r6:84133000 r5:84144800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f100 INFO: task kworker/1:47:3203 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5549000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84146000 r4:84146000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84146000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8417cd00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84146000 r7:00000000 r6:83018200 r5:00001000 r4:7f25d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec967000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e7f8c r4:850e7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e7f8c r4:84133080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84146000 r8:841330ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133080 r8:8027f5e8 r7:dfbf1e60 r6:84133100 r5:84146000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f480 INFO: task kworker/1:48:3206 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5b0c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbfdd84 r8:00000002 r7:60000013 r6:dfbfdd8c r5:84488000 r4:84488000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84488000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84488000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec343000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e6f8c r4:857e6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e6f8c r4:840aaf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84488000 r8:840aafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840aaf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840aaf80 r8:8027f5e8 r7:df9c9e60 r6:84133180 r5:84488000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848953c0 INFO: task kworker/0:4:3207 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5b0c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84145400 r4:84145400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84145400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84145400 r7:00000000 r6:83018200 r5:00001000 r4:7f281000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb91000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ee38c r4:848ee000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ee38c r4:84133200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84145400 r8:8413322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133200 r8:8027f5e8 r7:dfc09e60 r6:84133280 r5:84145400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f3c0 INFO: task kworker/1:49:3209 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5c46000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:84968c00 r4:84968c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84968c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b945c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f227000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848edf8c r4:848edc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848edf8c r4:84133300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84968c00 r8:8413332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133300 r8:8027f5e8 r7:dfc21e60 r6:84133380 r5:84968c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f880 INFO: task kworker/1:50:3212 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5edf000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84969800 r4:84969800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84969800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f283000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ecb8c r4:848ec800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ecb8c r4:84133400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84969800 r8:8413342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133400 r8:8027f5e8 r7:dfbe5e60 r6:84133480 r5:84969800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f980 INFO: task kworker/1:51:3213 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5edf000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3215 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc39d84 r8:00000002 r7:60000113 r6:dfc39d8c r5:8496b000 r4:8496b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc39e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496b000 r7:00000000 r6:83018200 r5:00001000 r4:7f215000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e778c r4:850e7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e778c r4:84133500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496b000 r8:8413352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133500 r8:8027f5e8 r7:dfbe5e60 r6:84133580 r5:8496b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc39fb0 to 0xdfc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417fc40 INFO: task kworker/1:52:3215 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6150000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3218 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:83a48c00 r4:83a48c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a48c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8417f880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e7b8c r4:850e7800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e7b8c r4:84133600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a48c00 r8:8413362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133600 r8:8027f5e8 r7:dfc39e60 r6:840aaf00 r5:83a48c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134000 INFO: task kworker/1:53:3218 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6150000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3219 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:84142400 r4:84142400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84142400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b944c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84142400 r7:00000000 r6:83018200 r5:00001000 r4:7f215000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbdb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ee78c r4:848ee400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ee78c r4:84133680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84142400 r8:841336ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133680 r8:8027f5e8 r7:dfc4de60 r6:840aae80 r5:84142400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134000 INFO: task kworker/1:54:3219 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6430000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3222 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc75d84 r8:00000002 r7:60000113 r6:dfc75d8c r5:84040000 r4:84040000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84040000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84040000 r7:00000000 r6:83018200 r5:00001000 r4:7f2fd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eeb8c r4:848ee800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848eeb8c r4:84133700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84040000 r8:8413372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133700 r8:8027f5e8 r7:dfc51e60 r6:840aa800 r5:84040000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:841344c0 INFO: task kworker/1:55:3222 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6430000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3224 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84040c00 r4:84040c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84040c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84040c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2fb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eef8c r4:848eec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848eef8c r4:84133780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84040c00 r8:841337ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133780 r8:8027f5e8 r7:dfc75e60 r6:840a9f00 r5:84040c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134380 INFO: task kworker/1:56:3224 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d69af000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3225 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc7dd84 r8:00000002 r7:60000013 r6:dfc7dd8c r5:84041800 r4:84041800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84041800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84041800 r7:00000000 r6:83018200 r5:00001000 r4:7f2f9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ef38c r4:848ef000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ef38c r4:84133800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84041800 r8:8413382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133800 r8:8027f5e8 r7:dfc79e60 r6:845f5900 r5:84041800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134380 INFO: task kworker/1:57:3225 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d69af000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3227 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc35d84 r8:00000002 r7:60000013 r6:dfc35d8c r5:8496c800 r4:8496c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f3c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece81000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fb38c r4:858fb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fb38c r4:84133880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496c800 r8:841338ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133880 r8:8027f5e8 r7:dfc7de60 r6:84133900 r5:8496c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134640 INFO: task kworker/1:58:3227 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6e31000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3229 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc99d84 r8:00000002 r7:60000013 r6:dfc99d8c r5:84968000 r4:84968000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84968000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f3c7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece79000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858faf8c r4:858fac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858faf8c r4:84133980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84968000 r8:841339ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133980 r8:8027f5e8 r7:dfc35e60 r6:84133a00 r5:84968000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc99fb0 to 0xdfc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134780 INFO: task kworker/1:59:3229 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6e31000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3231 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:8496d400 r4:8496d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856723c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3c5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece71000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fab8c r4:858fa800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fab8c r4:84133a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496d400 r8:84133aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133a80 r8:8027f5e8 r7:dfc99e60 r6:84133b00 r5:8496d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134540 INFO: task kworker/1:60:3231 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6e31000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3232 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfca9d84 r8:00000002 r7:60000013 r6:dfca9d8c r5:8496ec00 r4:8496ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512bb80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec35f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e738c r4:857e7000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e738c r4:845f5f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496ec00 r8:845f5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845f5f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845f5f00 r8:8027f5e8 r7:df9c9e60 r6:84133b80 r5:8496ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84895b40 INFO: task kworker/0:5:3232 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d73f0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3235 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfca5d84 r8:00000002 r7:60000113 r6:dfca5d8c r5:8496a400 r4:8496a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f3c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece69000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fa78c r4:858fa400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fa78c r4:84133c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496a400 r8:84133c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133c00 r8:8027f5e8 r7:dfc5de60 r6:84133c80 r5:8496a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134c80 INFO: task kworker/1:61:3235 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d73f0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3237 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:8496e000 r4:8496e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496e000 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece5d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fa38c r4:858fa000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fa38c r4:84133d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496e000 r8:84133d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133d00 r8:8027f5e8 r7:dfca5e60 r6:84133d80 r5:8496e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134d00 INFO: task kworker/1:62:3237 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d7cc3000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcbdd84 r8:00000002 r7:60000013 r6:dfcbdd8c r5:8496bc00 r4:8496bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ca400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3bd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece11000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f9f8c r4:858f9c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f9f8c r4:84133e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496bc00 r8:84133e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133e00 r8:8027f5e8 r7:dfc69e60 r6:84133e80 r5:8496bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134e80 INFO: task kworker/1:63:3240 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d7cc3000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:64:3242 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:84990000 r4:84990000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84990000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413d240 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84990000 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc5f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f8b8c r4:858f8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f8b8c r4:84133f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84990000 r8:84133f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133f00 r8:8027f5e8 r7:dfcbde60 r6:84133f80 r5:84990000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d100 INFO: task kworker/1:64:3242 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:3243 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:84990c00 r4:84990c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84990c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84134800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84990c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3b9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdf5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f978c r4:858f9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f978c r4:8413f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84990c00 r8:8413f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f000 r8:8027f5e8 r7:dfcc9e60 r6:8413f080 r5:84990c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d2c0 INFO: task kworker/1:65:3243 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3245 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcedd84 r8:00000002 r7:60000113 r6:dfcedd8c r5:84992400 r4:84992400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84992400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413d040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84992400 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f8f8c r4:858f8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f8f8c r4:8413f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84992400 r8:8413f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f100 r8:8027f5e8 r7:dfcc9e60 r6:8413f180 r5:84992400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d200 INFO: task kworker/1:66:3245 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:3247 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84991800 r4:84991800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84991800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e45c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84991800 r7:00000000 r6:83018200 r5:00001000 r4:7f44b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85905f8c r4:85905c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85905f8c r4:8413f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84991800 r8:8413f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f200 r8:8027f5e8 r7:dfcc9e60 r6:8413f280 r5:84991800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d700 INFO: task kworker/1:67:3247 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:3249 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84994800 r4:84994800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84994800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bacd40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84994800 r7:00000000 r6:83018200 r5:00001000 r4:7f3b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdeb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f938c r4:858f9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f938c r4:8413f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84994800 r8:8413f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f300 r8:8027f5e8 r7:dfcd5e60 r6:8413f380 r5:84994800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d640 INFO: task kworker/1:68:3249 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d88bd000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:3251 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:69 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd19d84 r8:00000002 r7:60000113 r6:dfd19d8c r5:84995400 r4:84995400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84995400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413d1c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84995400 r7:00000000 r6:83018200 r5:00001000 r4:7f3af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd5d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593c38c r4:8593c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593c38c r4:8413f400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84995400 r8:8413f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f400 r8:8027f5e8 r7:dfcd5e60 r6:8413f480 r5:84995400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d9c0 INFO: task kworker/1:69:3251 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d88bd000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:3254 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd01d84 r8:00000002 r7:60000013 r6:dfd01d8c r5:84043c00 r4:84043c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84043c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413de80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84043c00 r7:00000000 r6:83018200 r5:00001000 r4:7f449000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec989000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85905b8c r4:85905800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85905b8c r4:8413f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84043c00 r8:8413f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f580 r8:8027f5e8 r7:dfcd5e60 r6:840ab000 r5:84043c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413dbc0 INFO: task kworker/1:70:3254 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d8b76000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3255 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd31d84 r8:00000002 r7:60000113 r6:dfd31d8c r5:84043000 r4:84043000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84043000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818c40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84043000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec36d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e778c r4:857e7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e778c r4:840ab080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84043000 r8:840ab0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840ab080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840ab080 r8:8027f5e8 r7:df9c9e60 r6:840ab100 r5:84043000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd31fb0 to 0xdfd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84895ec0 INFO: task kworker/0:6:3255 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d8b76000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:3257 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:84044800 r4:84044800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84044800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413de00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84044800 r7:00000000 r6:83018200 r5:00001000 r4:7f447000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590578c r4:85905400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590578c r4:8413f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84044800 r8:8413f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f500 r8:8027f5e8 r7:dfd01e60 r6:840ab180 r5:84044800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413ddc0 INFO: task kworker/1:71:3257 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d8b76000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 0 <> :191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:6775 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:6775 tgid:6775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ece2dd84 r8:00000002 r7:60000113 r6:ece2dd8c r5:85873c00 r4:85873c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85873c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece2de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aabe00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae5f8c r4:85ae5c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae5f8c r4:85aa6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85873c00 r8:85aa66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6680 r8:8027f5e8 r7:ece39e60 r6:85aa6700 r5:85873c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece2dfb0 to 0xece2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:6776 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:6776 tgid:6776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecdd5d84 r8:00000002 r7:60000013 r6:ecdd5d8c r5:85874800 r4:85874800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85874800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aab200 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85874800 r7:00000000 r6:83018200 r5:00001000 r4:7f5d3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec92d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae638c r4:85ae6000 r7:ddde2d80 r6:83018200 r5:85ae638c r4:85aa6780 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:6780 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:6780 tgid:6780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ece49d84 r8:00000002 r7:60000013 r6:ece49d8c r5:85875400 r4:85875400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85875400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8f280 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xece49fb0 to 0xece49ff8) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:396:6781 blocked for more than 477 seconds. r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85aa6980 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:397 state:D stack:0 pid:6783 tgid:6783 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec99d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85aa6a80 r8:8027f5e8 r7:ece85e60 r6:85aa6b00 r5:85876c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85aa6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6b80 r8:8027f5e8 r7:ece85e60 r6:85aa6c00 r5:85873000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8fc40 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf91e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8f940 INFO: task kworker/1:400:6789 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:401 state:D stack:0 pid:6790 tgid:6790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8fac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b19800 r7:00000000 r6:83018200 r5:00001000 r4:7f5eb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae7f8c r4:85ae7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae7f8c r4:85aa6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b19800 r8:85aa6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a8fa00 Exception stack(0xe055dd28 to 0xe055dd70) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 Exception stack(0xe055dfb0 to 0xe055dff8) r10:82918930 r9:ecf95d84 r8:00000002 r7:60000113 r6:ecf95d8c r5:85b1a400 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85aa6f80 r10:00000000 r9:85aa6f80 r8:8027f5e8 r7:ecec5e60 r6:85a94000 r5:85b1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf95fb0 to 0xecf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8f940 INFO: task kworker/1:402:6793 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:403 state:D stack:0 pid:6796 tgid:6796 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a94180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94180 r8:8027f5e8 r7:ecfa9e60 r6:85a94200 r5:85b1bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf99fb0 to 0xecf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8fcc0 INFO: task kworker/1:404:6797 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb1e08 r5:00001000 r4:ecbe3000 r7:ddde2d80 r6:83018200 r5:85ae9f8c r4:85a94280 INFO: task kworker/1:405:6799 is blocked on a mutex likely owned by task kworker/0:191:3684. r4:e055ddc0 r5:84b16b8c r4:84b16800 r4:00000001 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:6800 tgid:6800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfb5d84 r8:00000002 r7:60000113 r6:ecfb5d8c r5:85b1ec00 r4:85b1ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b1ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d180 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecabd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85b1ec00 r8:85a943ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecae9000 r5:85ae978c r4:85ae9400 r4:85a94480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:84b16b8c r4:84b16800 Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d600 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:6808 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:6808 tgid:6808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfbdd84 r8:00000002 r7:60000113 r6:ecfbdd8c r5:85878000 r4:85878000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85878000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfbde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85878000 r7:00000000 r6:83018200 r5:00001000 r4:7f647000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aea38c r4:85aea000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aea38c r4:85a94680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85878000 r8:85a946ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a94680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94680 r8:8027f5e8 r7:ecfb1e60 r6:85a94700 r5:85878000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfbdfb0 to 0xecfbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8d640 INFO: task kworker/1:409:6808 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:6811 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:6811 tgid:6811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfc1d84 r8:00000002 r7:60000013 r6:ecfc1d8c r5:85878c00 r4:85878c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85878c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8da40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f649000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aea78c r4:85aea400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aea78c r4:85a94780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85878c00 r8:85a947ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a94780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94780 r8:8027f5e8 r7:ecfbde60 r6:85a94800 r5:85878c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfc1fb0 to 0xecfc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8d780 INFO: task kworker/1:410:6811 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85879800 r4:00000000 r9:83018205 r8:85879800 r7:00000000 r6:83018200 r5:00001000 r4:7f64f000 r5:85aeb38c r4:85aeb000 r10:61c88647 r9:85879800 r8:85a948ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:411:6812 is blocked on a mutex likely owned by task kworker/0:191:3684. dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r4:84b6b700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed045e08 r5:00001000 r4:ecc25000 r5:85aeab8c r4:85aea800 r4:85a94980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:6816 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:6816 tgid:6816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8587b000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecc53000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eccd9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8587bc00 r8:85a94bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:6820 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:6820 tgid:6820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed055d84 r8:00000002 r7:60000013 r6:ed055d8c r5:8587c800 r4:8587c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecca1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85aeb78c r4:85a94c80 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:6823 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:6823 tgid:6823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed059d84 r8:00000002 r7:60000113 r6:ed059d8c r5:8587d400 r4:8587d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed059e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8587d400 r7:00000000 r6:83018200 r5:00001000 r4:7f655000 r5:00001000 r4:ecd7f000 r5:85aebf8c r4:85aebc00 r10:61c88647 r9:8587d400 r8:85a94dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecd9d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:e055ddc0 r5:84b16b8c r4:84b16800 r4:84b6b700 Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:6826 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:6826 tgid:6826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed061d84 r8:00000002 r7:60000113 r6:ed061d8c r5:8587ec00 r4:8587ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8587ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f65b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af8b8c r4:85af8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af8b8c r4:85a94f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587ec00 r8:85a94fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a94f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94f80 r8:8027f5e8 r7:ed05de60 r6:85a5f000 r5:8587ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed061fb0 to 0xed061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a613c0 INFO: task kworker/1:418:6826 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b66900 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85b20000 r5:85b20000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b20000 r7:00000000 r6:83018200 r5:00001000 r4:7f659000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af878c r4:85af8400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af878c r4:85a5f080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b20000 r8:85a5f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f080 r8:8027f5e8 r7:ed061e60 r6:85a5f100 r5:85b20000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed161fb0 to 0xed161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a614c0 INFO: task kworker/1:419:6828 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:6831 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:6831 tgid:6831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed169d84 r8:00000002 r7:60000113 r6:ed169d8c r5:85b20c00 r4:85b20c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b20c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed169e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:85b20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f65d000 r5:00001000 r4:ece05000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af8f8c r4:85af8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af8f8c r4:85a5f180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b20c00 r8:85a5f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f180 r8:8027f5e8 r7:ed061e60 r6:85a5f200 r5:85b20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed169fb0 to 0xed169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a61640 INFO: task kworker/1:420:6831 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:6832 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:6832 tgid:6832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed175d84 r8:00000002 r7:60000013 r6:ed175d8c r5:85b21800 r4:85b21800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b21800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61c40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b21800 r7:00000000 r6:83018200 r5:00001000 r4:7f661000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece53000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af978c r4:85af9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:6835 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:6835 tgid:6835 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61b00 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 r5:00001000 r4:e03a5000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed18de08 r5:00001000 r4:ecea7000 r10:00000000 r9:85a5f480 r8:8027f5e8 r7:ed175e60 r6:85a5f500 r5:85b23000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:6839 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:6839 tgid:6839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1bdd84 r8:00000002 r7:60000113 r6:ed1bdd8c r5:85b23c00 r4:85b23c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b23c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f67d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afab8c r4:85afa800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afab8c r4:85a5f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b23c00 r8:85a5f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f580 r8:8027f5e8 r7:ed18de60 r6:85a5f600 r5:85b23c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1bdfb0 to 0xed1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8d280 INFO: task kworker/1:424:6839 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 r4:e055ddc0 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:425 state:D stack:0 pid:6846 tgid:6846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1100 r5:00001000 r4:dfd67000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed2d5fb0 to 0xed2d5ff8) r4:859a1300 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:e055ddc0 r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:6853 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:6853 tgid:6853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed2f1d84 r8:00000002 r7:60000013 r6:ed2f1d8c r5:85b25400 r4:85b25400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b25400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1a00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b25400 r7:00000000 r6:83018200 r5:00001000 r4:7f675000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afa78c r4:85afa400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afa78c r4:85a5f780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b25400 r8:85a5f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f780 r8:8027f5e8 r7:ed1bde60 r6:85a5f800 r5:85b25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f1fb0 to 0xed2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a1740 INFO: task kworker/1:426:6853 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:6873 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:6873 tgid:6873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed331d84 r8:00000002 r7:60000113 r6:ed331d8c r5:85b24800 r4:85b24800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b24800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed331e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b24800 r7:00000000 r6:83018200 r5:00001000 r4:7f683000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed019000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afaf8c r4:85afac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afaf8c r4:85a5f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b24800 r8:85a5f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f880 r8:8027f5e8 r7:ed1bde60 r6:85a5f900 r5:85b24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed331fb0 to 0xed331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a1480 INFO: task kworker/1:427:6873 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:6879 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:6879 tgid:6879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed325d84 r8:00000002 r7:60000113 r6:ed325d8c r5:85b26000 r4:85b26000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b26000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b26000 r7:00000000 r6:83018200 r5:00001000 r4:7f5c7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec885000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85afb78c r4:85a5f980 r4:85a5f980 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:6884 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:6884 tgid:6884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1b1d84 r8:00000002 r7:60000013 r6:ed1b1d8c r5:85b30000 r4:85b30000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b30000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b30000 r7:00000000 r6:83018200 r5:00001000 r4:7f5cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487078c r4:84870400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487078c r4:85a5fa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b30000 r8:85a5faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fa80 r8:8027f5e8 r7:ed325e60 r6:85a5fb00 r5:85b30000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b1fb0 to 0xed1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8300 INFO: task kworker/1:429:6884 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:6885 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:6885 tgid:6885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed32dd84 r8:00000002 r7:60000013 r6:ed32dd8c r5:85b30c00 r4:85b30c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b30c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed32de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afbb8c r4:85afb800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afbb8c r4:85a5fb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b30c00 r8:85a5fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fb80 r8:8027f5e8 r7:ed1b1e60 r6:85a5fc00 r5:85b30c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed32dfb0 to 0xed32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8300 INFO: task kworker/1:430:6885 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:6888 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:6888 tgid:6888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:85b31800 r4:85b31800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b31800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa84c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b31800 r7:00000000 r6:83018200 r5:00001000 r4:7f5cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec915000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afbf8c r4:85afbc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afbf8c r4:85a5fc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b31800 r8:85a5fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fc80 r8:8027f5e8 r7:ed1b1e60 r6:85a5fd00 r5:85b31800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec949fb0 to 0xec949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa86c0 INFO: task kworker/1:431:6888 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:6890 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:6890 tgid:6890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccadd84 r8:00000002 r7:60000113 r6:eccadd8c r5:85b33000 r4:85b33000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b33000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b33000 r7:00000000 r6:83018200 r5:00001000 r4:7f5df000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0438c r4:85b04000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0438c r4:85a5fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b33000 r8:85a5fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fd80 r8:8027f5e8 r7:ed1b1e60 r6:85a5fe00 r5:85b33000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccadfb0 to 0xeccadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8840 INFO: task kworker/1:432:6890 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:6892 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:6892 tgid:6892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed33dd84 r8:00000002 r7:60000013 r6:ed33dd8c r5:85b34800 r4:85b34800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b34800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed33de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b34800 r7:00000000 r6:83018200 r5:00001000 r4:7f5e1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9fd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0478c r4:85b04400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0478c r4:85a5fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b34800 r8:85a5feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fe80 r8:8027f5e8 r7:eccade60 r6:85a5ff00 r5:85b34800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed33dfb0 to 0xed33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8a80 INFO: task kworker/1:433:6892 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:6897 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:6897 tgid:6897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed345d84 r8:00000002 r7:60000013 r6:ed345d8c r5:85b32400 r4:85b32400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b32400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed345e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84132b00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b32400 r7:00000000 r6:83018200 r5:00001000 r4:7f5e5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b04f8c r4:85b04c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b04f8c r4:85a5ff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b32400 r8:85a5ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ff80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5ff80 r8:8027f5e8 r7:ed33de60 r6:85a92000 r5:85b32400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed345fb0 to 0xed345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8e00 INFO: task kworker/1:434:6897 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:6899 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:6899 tgid:6899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed339d84 r8:00000002 r7:60000013 r6:ed339d8c r5:85b33c00 r4:85b33c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b33c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed339e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca27000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b04b8c r4:85b04800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b04b8c r4:85a92080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b33c00 r8:85a920ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92080 r8:8027f5e8 r7:ed345e60 r6:85a92100 r5:85b33c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed339fb0 to 0xed339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84132b00 INFO: task kworker/1:435:6899 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:6901 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:6901 tgid:6901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed349d84 r8:00000002 r7:60000013 r6:ed349d8c r5:85b36000 r4:85b36000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b36000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed349e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b36000 r7:00000000 r6:83018200 r5:00001000 r4:7f5e7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0538c r4:85b05000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0538c r4:85a92180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b36000 r8:85a921ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92180 r8:8027f5e8 r7:ed345e60 r6:85a92200 r5:85b36000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed349fb0 to 0xed349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a78fc0 INFO: task kworker/1:436:6901 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:6904 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:6904 tgid:6904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85b36c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed34de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c280 r5:00001000 r4:ecac5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b0578c r4:85a92280 r4:85a92280 Exception stack(0xed34dfb0 to 0xed34dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:6905 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:6905 tgid:6905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed335d84 r8:00000002 r7:60000113 r6:ed335d8c r5:85b35400 r4:85b35400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b35400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed335e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c3c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b35400 r7:00000000 r6:83018200 r5:00001000 r4:7f633000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b05b8c r4:85b05800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b05b8c r4:85a92380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b35400 r8:85a923ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92380 r8:8027f5e8 r7:ed34de60 r6:85a92400 r5:85b35400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed335fb0 to 0xed335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c080 INFO: task kworker/1:438:6905 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:6906 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:6906 tgid:6906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed359d84 r8:00000002 r7:60000013 r6:ed359d8c r5:8570a400 r4:8570a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed359e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570a400 r7:00000000 r6:83018200 r5:00001000 r4:7f63b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc3b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0678c r4:85b06400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0678c r4:85a92480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570a400 r8:85a924ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92480 r8:8027f5e8 r7:ed335e60 r6:85689d80 r5:8570a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed359fb0 to 0xed359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c080 INFO: task kworker/1:439:6906 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:6909 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:6909 tgid:6909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed361d84 r8:00000002 r7:60000013 r6:ed361d8c r5:8570e000 r4:8570e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed361e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570e000 r7:00000000 r6:83018200 r5:00001000 r4:7f635000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b05f8c r4:85b05c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b05f8c r4:85a92500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570e000 r8:85a9252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92500 r8:8027f5e8 r7:ed359e60 r6:85689e00 r5:8570e000 r4:00000001 Exception stack(0xed361fb0 to 0xed361ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:6910 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:6910 tgid:6910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed365d84 r8:00000002 r7:60000013 r6:ed365d8c r5:8570c800 r4:8570c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed365e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570c800 r7:00000000 r6:83018200 r5:00001000 r4:7f639000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0638c r4:85b06000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0638c r4:85a92580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570c800 r8:85a925ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92580 r8:8027f5e8 r7:ed359e60 r6:85689e80 r5:8570c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed365fb0 to 0xed365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c480 INFO: task kworker/1:441:6910 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03a5000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:6915 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:6915 tgid:6915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed36dd84 r8:00000002 r7:60000013 r6:ed36dd8c r5:85778000 r4:85778000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85778000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed36de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ca00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85778000 r7:00000000 r6:83018200 r5:00001000 r4:7f63d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc65000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b06b8c r4:85b06800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b06b8c r4:85a92600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85a92600 r8:8027f5e8 r7:ed359e60 r6:85689f00 r5:85778000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:6916 tgid:6916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed35dd84 r8:00000002 r7:60000013 r6:ed35dd8c r5:85b38c00 r4:85b38c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b38c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed35de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8cb40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f641000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b06f8c r4:85b06c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b06f8c r4:85a92680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b38c00 r8:85a926ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92680 r8:8027f5e8 r7:ed36de60 r6:85a92700 r5:85b38c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed35dfb0 to 0xed35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c800 INFO: task kworker/1:443:6916 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:6918 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:6918 tgid:6918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed369d84 r8:00000002 r7:60000013 r6:ed369d8c r5:85b39800 r4:85b39800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b39800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed369e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8cd40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b39800 r7:00000000 r6:83018200 r5:00001000 r4:7f643000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0738c r4:85b07000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0738c r4:85a92780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b39800 r8:85a927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92780 r8:8027f5e8 r7:ed35de60 r6:85a92800 r5:85b39800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed369fb0 to 0xed369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c9c0 INFO: task kworker/1:444:6918 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r5:00001000 r4:e03a5000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe055dfb0 to 0xe055dff8) r4:84b66900 task:kworker/1:445 state:D stack:0 pid:6920 tgid:6920 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ece0b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b07f8c r4:85b07c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b07f8c r4:85a92880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3a400 r8:85a928ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92880 r8:8027f5e8 r7:ed369e60 r6:85a92900 r5:85b3a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed371fb0 to 0xed371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8ccc0 INFO: task kworker/1:445:6920 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85b3bc00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ce00 r5:00001000 r4:ecd97000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0778c r4:85b07400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0778c r4:85a92980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3bc00 r8:85a929ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92980 r8:8027f5e8 r7:ed371e60 r6:85a92a00 r5:85b3bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed375fb0 to 0xed375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8cbc0 INFO: task kworker/1:446:6922 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:85b3c800 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8cfc0 r5:00001000 r4:ecdb1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b07b8c r4:85b07800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b07b8c r4:85a92a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3c800 r8:85a92aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92a80 r8:8027f5e8 r7:ed371e60 r6:85a92b00 r5:85b3c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed355fb0 to 0xed355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8ce40 INFO: task kworker/1:447:6923 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:6927 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3d000 r5:85b1038c r4:85b10000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1038c r4:85a92b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3e000 r8:85a92bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92b80 r8:8027f5e8 r7:ed371e60 r6:85a92c00 r5:85b3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed381fb0 to 0xed381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69040 INFO: task kworker/1:448:6927 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:6931 tgid:6931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed385d84 r8:00000002 r7:60000113 r6:ed385d8c r5:85b3b000 r4:85b3b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b3b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed385e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f653000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece95000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b10b8c r4:85b10800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b10b8c r4:85a92c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3b000 r8:85a92cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92c80 r8:8027f5e8 r7:ed381e60 r6:85a92d00 r5:85b3b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed385fb0 to 0xed385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69380 INFO: task kworker/1:449:6931 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:6932 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:6932 tgid:6932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed37dd84 r8:00000002 r7:60000013 r6:ed37dd8c r5:85b3ec00 r4:85b3ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b3ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed37de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f651000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1078c r4:85b10400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1078c r4:85a92d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3ec00 r8:85a92dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed37dfb0 to 0xed37dff8) Workqueue: events bpf_prog_free_deferred dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:451 state:D stack:0 pid:6935 tgid:6935 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eceaf000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a92e80 r8:8027f5e8 r7:ed385e60 r6:85a92f00 r5:85b3d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed389fb0 to 0xed389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69580 INFO: task kworker/1:451:6935 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69a80 r5:00001000 r4:ed049000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b1138c r4:85a92f80 r10:00000000 r9:85a92f80 r8:8027f5e8 r7:ed389e60 r6:85a6c000 r5:85b40000 r4:85a69700 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:6938 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:6938 tgid:6938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed391d84 r8:00000002 r7:60000113 r6:ed391d8c r5:85b40c00 r4:85b40c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b40c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed391e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f65d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0cf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b11f8c r4:85b11c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b11f8c r4:85a6c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b40c00 r8:85a6c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c080 r8:8027f5e8 r7:ed379e60 r6:85a6c100 r5:85b40c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed391fb0 to 0xed391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69700 INFO: task kworker/1:453:6938 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:6939 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:6939 tgid:6939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed395d84 r8:00000002 r7:60000013 r6:ed395d8c r5:85b41800 r4:85b41800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69d40 r5:00001000 r4:ed09b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a6c180 r8:8027f5e8 r7:ed391e60 r6:85a6c200 r5:85b41800 r4:85a69c80 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 r4:84b6b700 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85b43c00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed0b1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c280 r8:8027f5e8 r7:ed391e60 r6:85a6c300 r5:85b43c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed399fb0 to 0xed399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a699c0 INFO: task kworker/1:455:6942 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:6944 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:6944 tgid:6944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed39dd84 r8:00000002 r7:60000113 r6:ed39dd8c r5:85b43000 r4:85b43000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b43000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed39de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b43000 r7:00000000 r6:83018200 r5:00001000 r4:7f65f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed11d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1238c r4:85b12000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1238c r4:85a6c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b43000 r8:85a6c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c380 r8:8027f5e8 r7:ed391e60 r6:85a6c400 r5:85b43000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed39dfb0 to 0xed39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65100 INFO: task kworker/1:456:6944 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:6946 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:6946 tgid:6946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed38dd84 r8:00000002 r7:60000113 r6:ed38dd8c r5:85b44800 r4:85b44800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b44800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed38de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1278c r4:85b12400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1278c r4:85a6c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b44800 r8:85a6c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c480 r8:8027f5e8 r7:ed39de60 r6:85a6c500 r5:85b44800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed38dfb0 to 0xed38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65280 INFO: task kworker/1:457:6946 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:6949 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:6949 tgid:6949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3a1d84 r8:00000002 r7:60000113 r6:ed3a1d8c r5:85b45400 r4:85b45400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b45400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b45400 r7:00000000 r6:83018200 r5:00001000 r4:7f661000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12b8c r4:85b12800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b12b8c r4:85a6c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b45400 r8:85a6c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c580 r8:8027f5e8 r7:ed38de60 r6:85a6c600 r5:85b45400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a1fb0 to 0xed3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a653c0 INFO: task kworker/1:458:6949 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:6950 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:6950 tgid:6950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3a5d84 r8:00000002 r7:60000013 r6:ed3a5d8c r5:85b46000 r4:85b46000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b46000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b46000 r7:00000000 r6:83018200 r5:00001000 r4:7f667000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12f8c r4:85b12c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b12f8c r4:85a6c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b46000 r8:85a6c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c680 r8:8027f5e8 r7:ed3a1e60 r6:85a6c700 r5:85b46000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a5fb0 to 0xed3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65500 INFO: task kworker/1:459:6950 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:6952 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:6952 tgid:6952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3a9d84 r8:00000002 r7:60000113 r6:ed3a9d8c r5:85b46c00 r4:85b46c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b46c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f67d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec729000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1378c r4:85b13400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1378c r4:85a6c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b46c00 r8:85a6c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c780 r8:8027f5e8 r7:ed3a5e60 r6:85a6c800 r5:85b46c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a9fb0 to 0xed3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a656c0 INFO: task kworker/1:460:6952 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:6954 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:6954 tgid:6954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3add84 r8:00000002 r7:60000113 r6:ed3add8c r5:85b42400 r4:85b42400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b42400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b42400 r7:00000000 r6:83018200 r5:00001000 r4:7f675000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec705000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1338c r4:85b13000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1338c r4:85a6c880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b42400 r8:85a6c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c880 r8:8027f5e8 r7:ed3a9e60 r6:85a6c900 r5:85b42400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3adfb0 to 0xed3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65800 INFO: task kworker/1:461:6954 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:6956 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:6956 tgid:6956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3b1d84 r8:00000002 r7:60000013 r6:ed3b1d8c r5:85b38000 r4:85b38000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b38000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b38000 r7:00000000 r6:83018200 r5:00001000 r4:7f683000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec749000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b13b8c r4:85b13800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b13b8c r4:85a6c980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b38000 r8:85a6c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c980 r8:8027f5e8 r7:ed3a9e60 r6:85a6ca00 r5:85b38000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b1fb0 to 0xed3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a659c0 INFO: task kworker/1:462:6956 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:6958 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:6958 tgid:6958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3b5d84 r8:00000002 r7:60000113 r6:ed3b5d8c r5:85b48000 r4:85b48000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b48000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b48000 r7:00000000 r6:83018200 r5:00001000 r4:7f689000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5038c r4:85b50000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5038c r4:85a6ca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b48000 r8:85a6caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6ca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6ca80 r8:8027f5e8 r7:ed3b1e60 r6:85a6cb00 r5:85b48000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b5fb0 to 0xed3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65ac0 INFO: task kworker/1:463:6958 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:6960 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:6960 tgid:6960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3b9d84 r8:00000002 r7:60000013 r6:ed3b9d8c r5:85b48c00 r4:85b48c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b48c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65e00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f687000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec769000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b13f8c r4:85b13c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b13f8c r4:85a6cb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b48c00 r8:85a6cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cb80 r8:8027f5e8 r7:ed3b5e60 r6:85a6cc00 r5:85b48c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b9fb0 to 0xed3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65c80 INFO: task kworker/1:464:6960 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:6962 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:6962 tgid:6962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3bdd84 r8:00000002 r7:60000113 r6:ed3bdd8c r5:85b49800 r4:85b49800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b49800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b49800 r7:00000000 r6:83018200 r5:00001000 r4:7f68f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec819000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50f8c r4:85b50c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b50f8c r4:85a6cc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b49800 r8:85a6ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cc80 r8:8027f5e8 r7:ed3b5e60 r6:85a6cd00 r5:85b49800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3bdfb0 to 0xed3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65e40 INFO: task kworker/1:465:6962 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:6963 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:6963 tgid:6963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3c1d84 r8:00000002 r7:60000113 r6:ed3c1d8c r5:85b4a400 r4:85b4a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f68b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5078c r4:85b50400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5078c r4:85a6cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4a400 r8:85a6cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cd80 r8:8027f5e8 r7:ed3bde60 r6:85a6ce00 r5:85b4a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c1fb0 to 0xed3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c080 INFO: task kworker/1:466:6963 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:6965 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:6965 tgid:6965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3c5d84 r8:00000002 r7:60000113 r6:ed3c5d8c r5:85b4b000 r4:85b4b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f68d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50b8c r4:85b50800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b50b8c r4:85a6ce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4b000 r8:85a6ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6ce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6ce80 r8:8027f5e8 r7:ed3bde60 r6:85a6cf00 r5:85b4b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c5fb0 to 0xed3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c240 INFO: task kworker/1:467:6965 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:6968 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:6968 tgid:6968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3c9d84 r8:00000002 r7:60000113 r6:ed3c9d8c r5:85b4bc00 r4:85b4bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f691000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb15000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5138c r4:85b51000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5138c r4:85a6cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4bc00 r8:85a6cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cf80 r8:8027f5e8 r7:ed3bde60 r6:8598d000 r5:85b4bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c9fb0 to 0xed3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c280 INFO: task kworker/1:468:6968 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:6970 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:6970 tgid:6970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3cdd84 r8:00000002 r7:60000113 r6:ed3cdd8c r5:85b4c800 r4:85b4c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4c800 r7:00000000 r6:83018200 r5:00001000 r4:7f693000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb49000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5178c r4:85b51400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5178c r4:8598d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4c800 r8:8598d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d080 r8:8027f5e8 r7:ed3c9e60 r6:8598d100 r5:85b4c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3cdfb0 to 0xed3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c400 INFO: task kworker/1:469:6970 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:6972 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:6972 tgid:6972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3d1d84 r8:00000002 r7:60000113 r6:ed3d1d8c r5:85b4d400 r4:85b4d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3d1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f695000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb93000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b51b8c r4:85b51800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b51b8c r4:8598d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4d400 r8:8598d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d180 r8:8027f5e8 r7:ed3cde60 r6:8598d200 r5:85b4d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3d1fb0 to 0xed3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c580 INFO: task kworker/1:470:6972 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:6974 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:6974 tgid:6974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3d5d84 r8:00000002 r7:60000113 r6:ed3d5d8c r5:85b4e000 r4:85b4e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3d5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599ca40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f697000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b51f8c r4:85b51c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b51f8c r4:8598d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4e000 r8:8598d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d280 r8:8027f5e8 r7:ed3d1e60 r6:8598d300 r5:85b4e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3d5fb0 to 0xed3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c700 INFO: task kworker/1:471:6974 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:6976 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:6976 tgid:6976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3d9d84 r8:00000002 r7:60000113 r6:ed3d9d8c r5:85b4ec00 r4:85b4ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cc00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f699000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd77000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5238c r4:85b52000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5238c r4:8598d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4ec00 r8:8598d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d380 r8:8027f5e8 r7:ed3d5e60 r6:8598d400 r5:85b4ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3d9fb0 to 0xed3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c8c0 INFO: task kworker/1:472:6976 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:6978 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:6978 tgid:6978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3ddd84 r8:00000002 r7:60000013 r6:ed3ddd8c r5:85b88000 r4:85b88000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b88000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cdc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b88000 r7:00000000 r6:83018200 r5:00001000 r4:7f69b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5278c r4:85b52400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5278c r4:8598d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b88000 r8:8598d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d480 r8:8027f5e8 r7:ed3d9e60 r6:8598d500 r5:85b88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3ddfb0 to 0xed3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599ca80 INFO: task kworker/1:473:6978 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:6980 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:6980 tgid:6980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3e9d84 r8:00000002 r7:60000013 r6:ed3e9d8c r5:8577bc00 r4:8577bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f140 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f6a3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf73000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5378c r4:85b53400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5378c r4:8598d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577bc00 r8:8598d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d580 r8:8027f5e8 r7:ed3dde60 r6:85689f80 r5:8577bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3e9fb0 to 0xed3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599cc40 INFO: task kworker/1:474:6980 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:6983 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:6983 tgid:6983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3f5d84 r8:00000002 r7:60000113 r6:ed3f5d8c r5:85779800 r4:85779800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85779800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cf00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85779800 r7:00000000 r6:83018200 r5:00001000 r4:7f69d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf07000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b52b8c r4:85b52800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b52b8c r4:8598d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85779800 r8:8598d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d600 r8:8027f5e8 r7:ed3e9e60 r6:8597c000 r5:85779800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f5fb0 to 0xed3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599cd80 INFO: task kworker/1:475:6983 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:6984 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:6984 tgid:6984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3f9d84 r8:00000002 r7:60000013 r6:ed3f9d8c r5:85778c00 r4:85778c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85778c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cfc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85778c00 r7:00000000 r6:83018200 r5:00001000 r4:7f69f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf21000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b52f8c r4:85b52c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b52f8c r4:8598d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85778c00 r8:8598d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d680 r8:8027f5e8 r7:ed3e9e60 r6:8597c080 r5:85778c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f9fb0 to 0xed3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599cd80 INFO: task kworker/1:476:6984 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:6985 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:6985 tgid:6985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3fdd84 r8:00000002 r7:60000113 r6:ed3fdd8c r5:8577d400 r4:8577d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3fde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577d400 r7:00000000 r6:83018200 r5:00001000 r4:7f6a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf5b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5338c r4:85b53000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5338c r4:8598d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577d400 r8:8598d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d700 r8:8027f5e8 r7:ed3e9e60 r6:8597c100 r5:8577d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3fdfb0 to 0xed3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511bf80 INFO: task kworker/1:477:6985 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:6988 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:6988 tgid:6988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed401d84 r8:00000002 r7:60000013 r6:ed401d8c r5:8577e000 r4:8577e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed401e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577e000 r7:00000000 r6:83018200 r5:00001000 r4:7f6a5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b53b8c r4:85b53800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b53b8c r4:8598d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577e000 r8:8598d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d780 r8:8027f5e8 r7:ed3e9e60 r6:8597c180 r5:8577e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed401fb0 to 0xed401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f200 INFO: task kworker/1:478:6988 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:6990 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:6990 tgid:6990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3e1d84 r8:00000002 r7:60000113 r6:ed3e1d8c r5:8577ec00 r4:8577ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85991e80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f6a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5738c r4:85a57000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5738c r4:8598d800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577ec00 r8:8598d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d800 r8:8027f5e8 r7:ed401e60 r6:8597c200 r5:8577ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3e1fb0 to 0xed3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:479:6990 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:6993 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:6993 tgid:6993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed409d84 r8:00000002 r7:60000013 r6:ed409d8c r5:8577b000 r4:8577b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed409e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577b000 r7:00000000 r6:83018200 r5:00001000 r4:7f6ab000 r5:00001000 r4:ecff9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b53f8c r4:85b53c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b53f8c r4:8598d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577b000 r8:8598d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d880 r8:8027f5e8 r7:ed3e1e60 r6:8597c280 r5:8577b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed409fb0 to 0xed409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:480:6993 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:481 state:D stack:0 pid:6995 tgid:6995 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8577c800 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed411e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed00f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b5c38c r4:8598d900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:6997 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:6997 tgid:6997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed419d84 r8:00000002 r7:60000113 r6:ed419d8c r5:8570d400 r4:8570d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed419e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570d400 r7:00000000 r6:83018200 r5:00001000 r4:7f6b1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5cb8c r4:85b5c800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5cb8c r4:8598d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570d400 r8:8598d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d980 r8:8027f5e8 r7:ed411e60 r6:8597c380 r5:8570d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed419fb0 to 0xed419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:482:6997 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:6998 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:6998 tgid:6998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3e5d84 r8:00000002 r7:60000113 r6:ed3e5d8c r5:85b88c00 r4:85b88c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b88c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed021000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c78c r4:85b5c400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5c78c r4:8598da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b88c00 r8:8598da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598da00 r8:8027f5e8 r7:ed419e60 r6:8598da80 r5:85b88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3e5fb0 to 0xed3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:483:6998 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:7000 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:7000 tgid:7000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed41dd84 r8:00000002 r7:60000013 r6:ed41dd8c r5:85b8a400 r4:85b8a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed41de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f6b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed139000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5d38c r4:85b5d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5d38c r4:8598db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8a400 r8:8598db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598db00 r8:8027f5e8 r7:ed419e60 r6:8598db80 r5:85b8a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed41dfb0 to 0xed41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f600 INFO: task kworker/1:484:7000 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:7003 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:7003 tgid:7003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed421d84 r8:00000002 r7:60000013 r6:ed421d8c r5:85b8c800 r4:85b8c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed421e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597fb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f6b3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5cf8c r4:8598dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8c800 r8:8598dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598dc00 r8:8027f5e8 r7:ed41de60 r6:8598dc80 r5:85b8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed421fb0 to 0xed421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f980 INFO: task kworker/1:485:7003 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:7005 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:7005 tgid:7005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed425d84 r8:00000002 r7:60000013 r6:ed425d8c r5:85b8d400 r4:85b8d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed425e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:85b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f6b7000 r5:00001000 r4:ed145000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b5d78c r4:8598dd00 r4:8598dd00 Exception stack(0xed425fb0 to 0xed425ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:7007 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:7007 tgid:7007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed429d84 r8:00000002 r7:60000113 r6:ed429d8c r5:85b8b000 r4:85b8b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed429e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f6bf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ad000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e38c r4:85b5e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5e38c r4:8598de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8b000 r8:8598de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598de00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598de00 r8:8027f5e8 r7:ed425e60 r6:8598de80 r5:85b8b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed429fb0 to 0xed429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597fa40 INFO: task kworker/1:487:7007 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:7009 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:7009 tgid:7009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed42dd84 r8:00000002 r7:60000013 r6:ed42dd8c r5:85b8ec00 r4:85b8ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed42de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a699c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f6b9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed14f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5db8c r4:85b5d800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5db8c r4:8598df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8ec00 r8:8598df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598df00 r8:8027f5e8 r7:ed429e60 r6:8598df80 r5:85b8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed42dfb0 to 0xed42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f240 INFO: task kworker/1:488:7009 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:7011 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:7011 tgid:7011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed435d84 r8:00000002 r7:60000013 r6:ed435d8c r5:85b8e000 r4:85b8e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed435e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f6bd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5df8c r4:85b5dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5df8c r4:85973000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8e000 r8:8597302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973000 r8:8027f5e8 r7:ed429e60 r6:85973080 r5:85b8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed435fb0 to 0xed435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975140 INFO: task kworker/1:489:7011 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 83ae3000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:7014 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:7014 tgid:7014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed431d84 r8:00000002 r7:60000113 r6:ed431d8c r5:85b8bc00 r4:85b8bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed431e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1e9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e78c r4:85b5e400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5e78c r4:85973100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8bc00 r8:8597312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973100 r8:8027f5e8 r7:ed429e60 r6:85973180 r5:85b8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed431fb0 to 0xed431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975340 INFO: task kworker/1:490:7014 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 83bd2000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:7016 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:7016 tgid:7016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed439d84 r8:00000002 r7:60000013 r6:ed439d8c r5:85b89800 r4:85b89800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b89800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed439e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5eb8c r4:85b5e800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5eb8c r4:85973200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b89800 r8:8597322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973200 r8:8027f5e8 r7:ed431e60 r6:85973280 r5:85b89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed439fb0 to 0xed439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975500 INFO: task kworker/1:491:7016 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 83e54000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:7018 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:7018 tgid:7018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed43dd84 r8:00000002 r7:60000013 r6:ed43dd8c r5:85b90000 r4:85b90000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b90000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed43de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859704c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b90000 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed249000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc038c r4:85bc0000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc038c r4:85973300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b90000 r8:8597332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973300 r8:8027f5e8 r7:ed439e60 r6:85973380 r5:85b90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed43dfb0 to 0xed43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975600 INFO: task kworker/1:492:7018 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84185000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:7020 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:7020 tgid:7020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed405d84 r8:00000002 r7:60000013 r6:ed405d8c r5:85b91800 r4:85b91800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b91800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed405e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ef8c r4:85b5ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5ef8c r4:85973400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b91800 r8:8597342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973400 r8:8027f5e8 r7:ed43de60 r6:85973480 r5:85b91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed405fb0 to 0xed405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859757c0 INFO: task kworker/1:493:7020 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84419000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:7025 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:7025 tgid:7025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed44dd84 r8:00000002 r7:60000013 r6:ed44dd8c r5:85b92400 r4:85b92400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b92400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed44de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859705c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b92400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed257000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc078c r4:85bc0400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc078c r4:85973500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b92400 r8:8597352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973500 r8:8027f5e8 r7:ed43de60 r6:85973580 r5:85b92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed44dfb0 to 0xed44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975b80 INFO: task kworker/1:494:7025 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 847d2000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:7027 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:7027 tgid:7027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed455d84 r8:00000002 r7:60000013 r6:ed455d8c r5:85b93c00 r4:85b93c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b93c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed455e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597fc40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed279000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5f38c r4:85b5f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5f38c r4:85973600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b93c00 r8:8597362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973600 r8:8027f5e8 r7:ed44de60 r6:85973680 r5:85b93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed455fb0 to 0xed455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975d80 INFO: task kworker/1:495:7027 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84bff000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:7029 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:7029 tgid:7029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed459d84 r8:00000002 r7:60000013 r6:ed459d8c r5:85b93000 r4:85b93000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b93000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed459e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85970700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b93000 r7:00000000 r6:83018200 r5:00001000 r4:7f6d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed26b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc0b8c r4:85bc0800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc0b8c r4:85973700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b93000 r8:8597372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973700 r8:8027f5e8 r7:ed455e60 r6:85973780 r5:85b93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed459fb0 to 0xed459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975f00 INFO: task kworker/1:496:7029 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84edd000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:7031 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:7031 tgid:7031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed45dd84 r8:00000002 r7:60000113 r6:ed45dd8c r5:85b90c00 r4:85b90c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b90c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed45de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6db000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2b3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ff8c r4:85b5fc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5ff8c r4:85973800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b90c00 r8:8597382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973800 r8:8027f5e8 r7:ed455e60 r6:8597c400 r5:85b90c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed45dfb0 to 0xed45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f240 INFO: task kworker/1:497:7031 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84edd000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:7033 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:7033 tgid:7033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed441d84 r8:00000002 r7:60000113 r6:ed441d8c r5:84848c00 r4:84848c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84848c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed441e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987180 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84848c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5f78c r4:85b5f400