Extracting prog: 7m10.498250996s Minimizing prog: 1h51m25.271241584s Simplifying prog options: 0s Extracting C: 8m41.511408847s Simplifying C: 59m25.947540997s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2, 0x0, @void, @value}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2, 0x0, @void, @value}, 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h6m43.228483104s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df83dd84 r8:00000002 r7:60000013 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf33000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d0f8c r4:859d0c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d0f8c r4:830b8400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ecf4 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 95439000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:2:95 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:95 tgid:95 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9b5d84 r8:00000002 r7:60000013 r6:df9b5d8c r5:83300c00 r4:83300c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83300c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ca40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83300c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb238c r4:84bb2000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb238c r4:832bd900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83300c00 r8:832bd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832bd900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd900 r8:8027ecf4 r7:df879e60 r6:832bd980 r5:83300c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b5fb0 to 0xdf9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832c2780 INFO: task kworker/1:2:95 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 96033000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/0:1:3096 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3096 tgid:3096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:83b46000 r4:83b46000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b46000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494da40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b46000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d3b8c r4:859d3800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d3b8c r4:847aee80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b46000 r8:847aeeac r7:82804d40 r6:dddced40 r5:dddced60 r4:847aee80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aee80 r8:8027ecf4 r7:df911e60 r6:847aed80 r5:83b46000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf975fb0 to 0xdf975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8482af40 INFO: task kworker/0:1:3096 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 96e55000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:0:3101 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3101 tgid:3101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df881d84 r8:00000002 r7:60000113 r6:df881d8c r5:83b45400 r4:83b45400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b45400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df881e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b45400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1b8c r4:84bb1800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb1b8c r4:844c3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b45400 r8:844c30ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:844c3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c3080 r8:8027ecf4 r7:df9b5e60 r6:847aef00 r5:83b45400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf881fb0 to 0xdf881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84808100 INFO: task kworker/1:0:3101 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9960b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/0:5:3121 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f5d84 r8:00000002 r7:60000013 r6:df9f5d8c r5:83b40000 r4:83b40000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b40000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84755c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b40000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc89000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d4f8c r4:851d4c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d4f8c r4:847aea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b40000 r8:847aeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:847aea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aea80 r8:8027ecf4 r7:df9a1e60 r6:847aeb00 r5:83b40000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845e2d40 INFO: task kworker/0:5:3121 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9b9e3000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:3:3124 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83aaec00 r4:83aaec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aaec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aaec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb178c r4:84bb1400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb178c r4:8472ef80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aaec00 r8:8472efac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8472ef80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472ef80 r8:8027ecf4 r7:df9b5e60 r6:844c3000 r5:83aaec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8472c400 INFO: task kworker/1:3:3124 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9c31f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/0:7:3125 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa0dd84 r8:00000002 r7:60000013 r6:dfa0dd8c r5:83240000 r4:83240000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505cc40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0457000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ef78c r4:841ef400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ef78c r4:842bd580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240000 r8:842bd5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:842bd580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842bd580 r8:8027ecf4 r7:df9f5e60 r6:842bd600 r5:83240000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845bfa80 INFO: task kworker/0:7:3125 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9cbf7000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:4:3128 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:84288c00 r4:84288c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84288c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd338c r4:84bd3000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd338c r4:8482c000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84288c00 r8:8482c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c000 r8:8027ecf4 r7:df9b5e60 r6:838a2180 r5:84288c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848169c0 INFO: task kworker/1:4:3128 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9d695000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:5:3130 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:840c1800 r4:840c1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840c1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ded40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae15000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c4b8c r4:847c4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c4b8c r4:8482c080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840c1800 r8:8482c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c080 r8:8027ecf4 r7:dfa21e60 r6:838a2080 r5:840c1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845d3a40 INFO: task kworker/1:5:3130 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9df1f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:6:3131 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:83ab5400 r4:83ab5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ab5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a15c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa25000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515cb8c r4:8515c800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515cb8c r4:8482c100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab5400 r8:8482c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c100 r8:8027ecf4 r7:dfa2de60 r6:838a2200 r5:83ab5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84827d40 INFO: task kworker/1:6:3131 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9ebf6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3133 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83aa6c00 r4:83aa6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb93000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519378c r4:85193400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519378c r4:8482c180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6c00 r8:8482c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c180 r8:8027ecf4 r7:dfa2de60 r6:8482c200 r5:83aa6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab100 INFO: task kworker/1:7:3133 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f0cf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3136 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:83aa4800 r4:83aa4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa4800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb387000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d2b8c r4:859d2800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d2b8c r4:838a2300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa4800 r8:838a232c r7:82804d40 r6:dddced40 r5:dddced60 r4:838a2300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2300 r8:8027ecf4 r7:df9f5e60 r6:8482c280 r5:83aa4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1080 INFO: task kworker/0:8:3136 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f0cf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3137 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa55d84 r8:00000002 r7:60000013 r6:dfa55d8c r5:83aa2400 r4:83aa2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852884c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520278c r4:85202400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520278c r4:830cd300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa2400 r8:830cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027ecf4 r7:dfa51e60 r6:8482c300 r5:83aa2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1080 INFO: task kworker/0:9:3137 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f0cf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:83aa1800 r4:83aa1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf55000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526078c r4:85260400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526078c r4:8482c380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa1800 r8:8482c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c380 r8:8027ecf4 r7:dfa2de60 r6:8482c400 r5:83aa1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab500 INFO: task kworker/1:8:3140 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f6e7000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3142 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f1d84 r8:00000002 r7:60000013 r6:df9f1d8c r5:83aa5400 r4:83aa5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa5400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526a78c r4:8526a400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526a78c r4:8482c500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa5400 r8:8482c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c500 r8:8027ecf4 r7:dfa4de60 r6:8482c580 r5:83aa5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab580 INFO: task kworker/1:9:3142 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9fd29000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3144 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:83aa6000 r4:83aa6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa6000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c5f8c r4:847c5c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c5f8c r4:8482c480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6000 r8:8482c4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c480 r8:8027ecf4 r7:df9f1e60 r6:8482c600 r5:83aa6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab780 INFO: task kworker/1:10:3144 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9fd29000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:83aa0000 r4:83aa0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abc80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa0000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ab38c r4:853ab000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ab38c r4:8482c680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa0000 r8:8482c6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c680 r8:8027ecf4 r7:dfa71e60 r6:8482c700 r5:83aa0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab780 INFO: task kworker/1:11:3146 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9fecc000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa99d84 r8:00000002 r7:60000013 r6:dfa99d8c r5:8386e000 r4:8386e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8386e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b5600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8386e000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa73000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530fb8c r4:8530f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530fb8c r4:830cd280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8386e000 r8:830cd2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027ecf4 r7:dfa51e60 r6:8482c780 r5:8386e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1540 INFO: task kworker/0:10:3148 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0096000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:83aa0c00 r4:83aa0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853abb8c r4:853ab800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853abb8c r4:8482c800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa0c00 r8:8482c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c800 r8:8027ecf4 r7:dfa71e60 r6:8482c880 r5:83aa0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847abdc0 INFO: task kworker/1:12:3150 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a024f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3153 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:8387bc00 r4:8387bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8387bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568b880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8387bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb359000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d3f8c r4:853d3c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d3f8c r4:8482c900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8387bc00 r8:8482c92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c900 r8:8027ecf4 r7:dfa71e60 r6:830cd100 r5:8387bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8080 INFO: task kworker/1:13:3153 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a03b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac9d84 r8:00000002 r7:60000013 r6:dfac9d8c r5:8387e000 r4:8387e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8387e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8387e000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d178c r4:853d1400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d178c r4:8482c980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8387e000 r8:8482c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c980 r8:8027ecf4 r7:dfac1e60 r6:830cd400 r5:8387e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8080 INFO: task kworker/1:14:3155 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a03b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3156 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:8387ec00 r4:8387ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8387ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526c00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8387ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb721000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555d38c r4:8555d000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555d38c r4:8482ca00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8387ec00 r8:8482ca2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482ca00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482ca00 r8:8027ecf4 r7:dfac1e60 r6:830cd080 r5:8387ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8240 INFO: task kworker/1:15:3156 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0682000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3158 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83aa3000 r4:83aa3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563e680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb035000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d2f8c r4:853d2c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d2f8c r4:8482ca80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3000 r8:8482caac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482ca80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482ca80 r8:8027ecf4 r7:dfac1e60 r6:8482cb00 r5:83aa3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8180 INFO: task kworker/1:16:3158 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a083a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3161 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:832ec800 r4:832ec800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832ec800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855540 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb155000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572bf8c r4:8572bc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8572bf8c r4:8482cb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ec800 r8:8482cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482cb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482cb80 r8:8027ecf4 r7:dfac1e60 r6:8482cc00 r5:832ec800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8640 INFO: task kworker/1:17:3161 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0cc0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3162 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:832e8c00 r4:832e8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832e8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578f880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571838c r4:85718000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8571838c r4:8482cc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e8c00 r8:8482ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482cc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482cc80 r8:8027ecf4 r7:dfad9e60 r6:8482cd00 r5:832e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8640 INFO: task kworker/1:18:3162 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0cc0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3165 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:840be000 r4:840be000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840be000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a88b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840be000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ad000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857edf8c r4:857edc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857edf8c r4:8482cd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840be000 r8:8482cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482cd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482cd80 r8:8027ecf4 r7:dfad9e60 r6:8482ce00 r5:840be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8740 INFO: task kworker/1:19:3165 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1213000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3166 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:840bd400 r4:840bd400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840bd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a8900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ecb8c r4:857ec800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ecb8c r4:8482ce80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840bd400 r8:8482ceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482ce80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482ce80 r8:8027ecf4 r7:dfaf1e60 r6:8482cf00 r5:840bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8740 INFO: task kworker/1:20:3166 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1213000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3168 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:840bc800 r4:840bc800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840bc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d1f8c r4:859d1c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d1f8c r4:830cd380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840bc800 r8:830cd3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd380 r8:8027ecf4 r7:dfa51e60 r6:8482cf80 r5:840bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1e80 INFO: task kworker/0:11:3168 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a169e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3170 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:840b9800 r4:840b9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840b9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b3dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c178c r4:850c1400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c178c r4:84749000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840b9800 r8:8474902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749000 r8:8027ecf4 r7:dfaf1e60 r6:84749080 r5:840b9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a89c0 INFO: task kworker/1:21:3170 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a19d1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3172 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:840bec00 r4:840bec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840bec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592c940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85810f8c r4:85810c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85810f8c r4:84749100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840bec00 r8:8474912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749100 r8:8027ecf4 r7:dfb15e60 r6:84749180 r5:840bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8b40 INFO: task kworker/1:22:3172 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1c3b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3173 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:840b8000 r4:840b8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840b8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b37c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec667000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85902b8c r4:85902800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85902b8c r4:84749200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840b8000 r8:8474922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749200 r8:8027ecf4 r7:dfb21e60 r6:84749280 r5:840b8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8d80 INFO: task kworker/1:23:3173 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1c3b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3176 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:83304800 r4:83304800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83304800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83304800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdb1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7cf8c r4:85a7cc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7cf8c r4:84749300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83304800 r8:8474932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749300 r8:8027ecf4 r7:dfb21e60 r6:84749380 r5:83304800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab0c0 INFO: task kworker/1:24:3176 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1ee4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3178 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:84918000 r4:84918000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84918000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549cc40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84918000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea783000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581238c r4:85812000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8581238c r4:84749400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84918000 r8:8474942c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749400 r8:8027ecf4 r7:dfb39e60 r6:84749480 r5:84918000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493f080 INFO: task kworker/1:25:3178 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2136000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3179 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:84918c00 r4:84918c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84918c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85887940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84918c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb63000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f1f8c r4:859f1c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859f1f8c r4:84749500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84918c00 r8:8474952c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749500 r8:8027ecf4 r7:dfb39e60 r6:84749580 r5:84918c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493f080 INFO: task kworker/1:26:3179 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a228a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3183 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83878c00 r4:83878c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83878c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdbb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e438c r4:859e4000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e438c r4:830b8700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83878c00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ecf4 r7:dfa51e60 r6:830b8580 r5:83878c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1240 INFO: task kworker/0:12:3183 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a256b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3184 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:83878000 r4:83878000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83878000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83878000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d2f8c r4:859d2c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d2f8c r4:832a1500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83878000 r8:832a152c r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1500 r8:8027ecf4 r7:dfb2de60 r6:832a1880 r5:83878000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1240 INFO: task kworker/0:13:3184 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a256b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3186 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84768000 r4:84768000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84768000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494d940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84768000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ff000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d378c r4:859d3400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d378c r4:8459ef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84768000 r8:8459ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8459ef00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8459ef00 r8:8027ecf4 r7:dfb2de60 r6:8459ef80 r5:84768000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1240 INFO: task kworker/0:14:3186 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2a57000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3189 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb79d84 r8:00000002 r7:60000013 r6:dfb79d8c r5:84768c00 r4:84768c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84768c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84768c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1bd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cf78c r4:847cf400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847cf78c r4:84749600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84768c00 r8:8474962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749600 r8:8027ecf4 r7:dfb39e60 r6:8459e180 r5:84768c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493f6c0 INFO: task kworker/1:27:3189 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2dad000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3191 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:84769800 r4:84769800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84769800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85392200 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84769800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafaf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539c78c r4:8539c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539c78c r4:84749680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84769800 r8:847496ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749680 r8:8027ecf4 r7:dfb79e60 r6:8459e200 r5:84769800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:28:3191 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2e79000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3193 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:8476b000 r4:8476b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f1b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7eb8c r4:85a7e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7eb8c r4:84749700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:8474972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749700 r8:8027ecf4 r7:dfb85e60 r6:8459e500 r5:8476b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:29:3193 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2e79000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3195 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:8476a400 r4:8476a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476a400 r7:00000000 r6:83018200 r5:00001000 r4:7f1b5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7f38c r4:85a7f000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7f38c r4:84749780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476a400 r8:847497ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749780 r8:8027ecf4 r7:dfb9de60 r6:84944000 r5:8476a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fbc0 INFO: task kworker/1:30:3195 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a341d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3197 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:8476bc00 r4:8476bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f1b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7ef8c r4:85a7ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7ef8c r4:84749880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476bc00 r8:847498ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749880 r8:8027ecf4 r7:dfb9de60 r6:84944080 r5:8476bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:31:3197 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a341d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3198 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc1d84 r8:00000002 r7:60000013 r6:dfbc1d8c r5:8476d400 r4:8476d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1d9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b80b8c r4:85b80800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b80b8c r4:84749900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:8474992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749900 r8:8027ecf4 r7:dfb9de60 r6:84944100 r5:8476d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:32:3198 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a35e1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3200 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:8476c800 r4:8476c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476c800 r7:00000000 r6:83018200 r5:00001000 r4:7f1af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb61000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7e78c r4:85a7e400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7e78c r4:84749980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476c800 r8:847499ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749980 r8:8027ecf4 r7:dfbc1e60 r6:84944180 r5:8476c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fec0 INFO: task kworker/1:33:3200 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3812000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3202 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:8476e000 r4:8476e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c429c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476e000 r7:00000000 r6:83018200 r5:00001000 r4:7f34d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b82f8c r4:85b82c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b82f8c r4:84749a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476e000 r8:84749a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749a00 r8:8027ecf4 r7:dfbc1e60 r6:84944200 r5:8476e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942000 INFO: task kworker/1:34:3202 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3b50000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3205 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:84481800 r4:84481800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84481800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849421c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84481800 r7:00000000 r6:83018200 r5:00001000 r4:7f261000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1f1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8178c r4:85b81400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8178c r4:84749a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84481800 r8:84749aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749a80 r8:8027ecf4 r7:dfbe1e60 r6:84944280 r5:84481800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942140 INFO: task kworker/1:35:3205 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3f70000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3207 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84480c00 r4:84480c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84480c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b59600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84480c00 r7:00000000 r6:83018200 r5:00001000 r4:7f293000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd19000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1878c r4:85b18400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b1878c r4:84749b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84480c00 r8:84749b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749b00 r8:8027ecf4 r7:dfbe1e60 r6:84944300 r5:84480c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942280 INFO: task kworker/1:36:3207 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3f70000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3209 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc11d84 r8:00000002 r7:60000013 r6:dfc11d8c r5:84483000 r4:84483000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84483000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b27c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84483000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec917000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84944380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84483000 r8:849443ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944380 r8:8027ecf4 r7:dfb2de60 r6:84944400 r5:84483000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84826c40 INFO: task kworker/0:15:3209 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a467b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3210 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84483c00 r4:84483c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84483c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c42bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84483c00 r7:00000000 r6:83018200 r5:00001000 r4:7f351000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed315000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8378c r4:85b83400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8378c r4:84749b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84483c00 r8:84749bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749b80 r8:8027ecf4 r7:dfbe1e60 r6:84944480 r5:84483c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849423c0 INFO: task kworker/1:37:3210 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a467b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3212 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84482400 r4:84482400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84482400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c42ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84482400 r7:00000000 r6:83018200 r5:00001000 r4:7f34f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec899000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8338c r4:85b83000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8338c r4:84749c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84482400 r8:84749c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749c00 r8:8027ecf4 r7:dfbe1e60 r6:84944500 r5:84482400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942700 INFO: task kworker/1:38:3212 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a4c2f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3214 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84480000 r4:84480000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84480000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab7ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84480000 r7:00000000 r6:83018200 r5:00001000 r4:7f351000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed389000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba138c r4:85ba1000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ba138c r4:84749c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84480000 r8:84749cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749c80 r8:8027ecf4 r7:dfbe1e60 r6:84944580 r5:84480000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942640 INFO: task kworker/1:39:3214 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5045000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3216 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:84484800 r4:84484800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84484800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abeb80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84484800 r7:00000000 r6:83018200 r5:00001000 r4:7f307000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc19000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8238c r4:85b82000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8238c r4:84749d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84484800 r8:84749d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749d00 r8:8027ecf4 r7:dfc3de60 r6:84944600 r5:84484800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942780 INFO: task kworker/1:40:3216 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5045000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3218 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84486c00 r4:84486c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84486c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84942640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84486c00 r7:00000000 r6:83018200 r5:00001000 r4:7f31b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece69000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8278c r4:85b82400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8278c r4:84749d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486c00 r8:84749dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749d80 r8:8027ecf4 r7:dfc3de60 r6:84944680 r5:84486c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942ac0 INFO: task kworker/1:41:3218 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a547f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3220 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:84486000 r4:84486000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84486000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c42880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84486000 r7:00000000 r6:83018200 r5:00001000 r4:7f34b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b82b8c r4:85b82800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b82b8c r4:84749e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486000 r8:84749e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749e00 r8:8027ecf4 r7:dfc3de60 r6:84944700 r5:84486000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942bc0 INFO: task kworker/1:42:3220 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a59b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3223 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:84485400 r4:84485400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84485400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cd400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84485400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d3f8c r4:859d3c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d3f8c r4:84944780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84485400 r8:849447ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944780 r8:8027ecf4 r7:dfb2de60 r6:84944800 r5:84485400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848261c0 INFO: task kworker/0:16:3223 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5ce6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3224 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:84920000 r4:84920000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d0300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84920000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6878c r4:85e68400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6878c r4:84749f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:84749f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749f00 r8:8027ecf4 r7:dfc3de60 r6:84944880 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942f40 INFO: task kworker/1:43:3224 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5ce6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3227 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc8dd84 r8:00000002 r7:60000013 r6:dfc8dd8c r5:84920c00 r4:84920c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84920c00 r7:00000000 r6:83018200 r5:00001000 r4:7f42f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee015000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6638c r4:85e66000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6638c r4:84749f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920c00 r8:84749fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749f80 r8:8027ecf4 r7:dfc81e60 r6:84944900 r5:84920c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942fc0 INFO: task kworker/1:44:3227 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a6312000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3231 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:84921800 r4:84921800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84921800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cde80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841d8f8c r4:841d8c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841d8f8c r4:84944980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84921800 r8:849449ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944980 r8:8027ecf4 r7:dfb2de60 r6:84944a00 r5:84921800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959180 INFO: task kworker/0:17:3231 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a650c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3232 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:84922400 r4:84922400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84922400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587a040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84922400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb71000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a74b8c r4:85a74800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a74b8c r4:84944a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84922400 r8:84944aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944a80 r8:8027ecf4 r7:dfb2de60 r6:84944b00 r5:84922400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959180 INFO: task kworker/0:18:3232 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a66b8000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3235 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:84923000 r4:84923000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84923000 r7:00000000 r6:83018200 r5:00001000 r4:7f429000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfe9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6578c r4:85e65400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6578c r4:84749e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923000 r8:84749eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749e80 r8:8027ecf4 r7:dfc8de60 r6:84944c00 r5:84923000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84826b40 INFO: task kworker/1:45:3235 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a6872000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3236 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:84923c00 r4:84923c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cd000 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb87000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841d8b8c r4:841d8800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841d8b8c r4:84944b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923c00 r8:84944bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944b80 r8:8027ecf4 r7:dfb2de60 r6:84944c80 r5:84923c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959500 INFO: task kworker/0:19:3236 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a6c14000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3237 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:84924800 r4:84924800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84924800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84924800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc1b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841d878c r4:841d8400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841d878c r4:84944d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84924800 r8:84944d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84944d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944d00 r8:8027ecf4 r7:dfb2de60 r6:84944d80 r5:84924800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959500 INFO: task kworker/0:20:3237 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7038000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3241 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:84925400 r4:84925400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84925400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858623c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84925400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecddf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e478c r4:859e4400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e478c r4:84944e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84925400 r8:84944e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84944e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944e00 r8:8027ecf4 r7:dfb2de60 r6:84944e80 r5:84925400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959900 INFO: task kworker/0:21:3241 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7038000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3242 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:84926000 r4:84926000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb365000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e538c r4:859e5000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e538c r4:84944f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926000 r8:84944f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84944f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944f00 r8:8027ecf4 r7:dfa1de60 r6:84944f80 r5:84926000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959980 INFO: task kworker/0:22:3242 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a723a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3243 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:84926c00 r4:84926c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858624c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84926c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae31000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e4b8c r4:859e4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e4b8c r4:8494e000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926c00 r8:8494e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e000 r8:8027ecf4 r7:dfa6de60 r6:8494e080 r5:84926c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959980 INFO: task kworker/0:23:3243 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a74b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3246 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:848f8000 r4:848f8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e4f8c r4:859e4c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e4f8c r4:8494e100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8000 r8:8494e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e100 r8:8027ecf4 r7:dfa6de60 r6:8494e180 r5:848f8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959cc0 INFO: task kworker/0:24:3246 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a771c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3248 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:848f8c00 r4:848f8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e5b8c r4:859e5800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e5b8c r4:8494e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8c00 r8:8494e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e200 r8:8027ecf4 r7:dfa6de60 r6:8494e280 r5:848f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959cc0 INFO: task kworker/0:25:3248 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7adf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3250 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:848f9800 r4:848f9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb589000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e578c r4:859e5400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e578c r4:8494e300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f9800 r8:8494e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e300 r8:8027ecf4 r7:dfa85e60 r6:8494e380 r5:848f9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849431c0 INFO: task kworker/0:26:3250 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7adf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3252 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:848fb000 r4:848fb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb827000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e638c r4:859e6000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e638c r4:8494e400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fb000 r8:8494e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e400 r8:8027ecf4 r7:dfa85e60 r6:8494e480 r5:848fb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943340 INFO: task kworker/0:27:3252 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7f4f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3254 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:848fbc00 r4:848fbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb795000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e5f8c r4:859e5c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e5f8c r4:8494e500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fbc00 r8:8494e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e500 r8:8027ecf4 r7:dfab1e60 r6:8494e580 r5:848fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849432c0 INFO: task kworker/0:28:3254 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a8167000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3255 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:848fc800 r4:848fc800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862c40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e678c r4:859e6400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e678c r4:8494e600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fc800 r8:8494e62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e600 r8:8027ecf4 r7:dfab1e60 r6:8494e680 r5:848fc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849432c0 INFO: task kworker/0:29:3255 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a86b2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3258 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:848fd400 r4:848fd400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e6b8c r4:859e6800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e6b8c r4:8494e700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fd400 r8:8494e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e700 r8:8027ecf4 r7:dfaede60 r6:8494e780 r5:848fd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849436c0 INFO: task kworker/0:30:3258 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a876b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3260 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:848fe000 r4:848fe000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fe000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec487000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e778c r4:859e7400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e778c r4:8494e880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fe000 r8:8494e8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e880 r8:8027ecf4 r7:dfabde60 r6:8494e900 r5:848fe000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943800 INFO: task kworker/0:31:3260 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a910e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3261 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:848fec00 r4:848fec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862e00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e6f8c r4:859e6c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e6f8c r4:8494e980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fec00 r8:8494e9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e980 r8:8027ecf4 r7:dfb1de60 r6:8494ea00 r5:848fec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943800 INFO: task kworker/0:32:3261 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a9208000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3264 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:848fa400 r4:848fa400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fa400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:0000 <> d) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544038c r4:854b2f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eec00 r8:854b2fac r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2f80 r8:8027ecf4 r7:eb45de60 r6:85376900 r5:853eec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca380 INFO: task kworker/0:512:4882 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7a15000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4883 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:85472400 r4:85472400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85472400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ca940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85472400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb465000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544078c r4:85440400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544078c r4:854ce000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85472400 r8:854ce02c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce000 r8:8027ecf4 r7:eb45de60 r6:854ce080 r5:85472400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca680 INFO: task kworker/0:513:4883 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7f01000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4885 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb469d84 r8:00000002 r7:60000013 r6:eb469d8c r5:85473000 r4:85473000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85473000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85473000 r8:854ce12c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce100 r8:8027ecf4 r7:eb45de60 r6:854ce180 r5:85473000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca7c0 INFO: task kworker/0:514:4885 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7f01000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r4:e8709dc0 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4888 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4888 tgid:4888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb485d84 r8:00000002 r7:60000113 r6:eb485d8c r5:85473c00 r4:85473c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85473c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cac40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85473c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb481000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85440f8c r4:85440c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85440f8c r4:854ce200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85473c00 r8:854ce22c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce200 r8:8027ecf4 r7:eb45de60 r6:854ce280 r5:85473c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca8c0 INFO: task kworker/0:515:4888 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:85474800 r4:85474800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85474800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cad80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85474800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544138c r4:85441000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544138c r4:854ce300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:854ce300 r8:8027ecf4 r7:eb45de60 r6:854ce380 r5:85474800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:853e9800 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:853e9800 r8:854ce42c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854cad40 INFO: task kworker/0:517:4891 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b8fdf000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe8709fb0 to 0xe8709ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:85476000 r4:85476000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85476000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd040 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85476000 r8:854ce4ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4c9d84 r8:00000002 r7:60000113 r6:eb4c9d8c r5:844b0000 r4:844b0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544278c r4:85442400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544278c r4:854ce580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b0000 r8:854ce5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce580 r8:8027ecf4 r7:eb4a9e60 r6:854ce600 r5:844b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:844b0c00 r4:844b0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa39000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544238c r4:85442000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544238c r4:854ce680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b0c00 r8:854ce6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce680 r8:8027ecf4 r7:eb4c9e60 r6:854ce700 r5:844b0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854dd180 INFO: task kworker/0:520:4898 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4901 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:844b1800 r5:844b1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd800 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85442b8c r4:85442800 r10:00000000 r9:854ce780 r8:8027ecf4 r7:eb4c9e60 r6:854ce800 r5:844b1800 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:4903 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddb00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46bf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544338c r4:85443000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544338c r4:854ce880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ed400 r8:854ce8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce880 r8:8027ecf4 r7:eb4b5e60 r6:85376a00 r5:853ed400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe8709d20 to 0xe8709d68) 9d60: 80000013 ffffffff r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85022b8c r4:85022800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:4904 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:853ea400 r4:853ea400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ea400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0437000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85442f8c r4:85442c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85442f8c r4:854ce900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ea400 r8:854ce92c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce900 r8:8027ecf4 r7:eb4d1e60 r6:85376a80 r5:853ea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4906 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4ddd84 r8:00000002 r7:60000013 r6:eb4ddd8c r5:852ea400 r4:852ea400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ea400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bc8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544838c r4:85448000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544838c r4:854ce980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ea400 r8:854ce9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce980 r8:8027ecf4 r7:eb4d1e60 r6:85376b00 r5:852ea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854dd780 INFO: task kworker/0:524:4906 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 INFO: task kworker/0:525:4908 blocked for more than 474 seconds. Call trace: [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddc00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544378c r4:85443400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544378c r4:854cea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ee000 r8:854cea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854cea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cea00 r8:8027ecf4 r7:eb4dde60 r6:85376b80 r5:853ee000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ddbc0 INFO: task kworker/0:525:4908 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ba561000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe8709fb0 to 0xe8709ff8) INFO: task kworker/0:526:4910 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:853f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r10:61c88647 r9:853f0c00 r8:854ceaac r7:82804d40 r6:dddced40 r5:dddced60 r4:854cea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cea80 r8:8027ecf4 r7:eb4dde60 r6:85376c00 r5:853f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4edfb0 to 0xeb4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854dda00 INFO: task kworker/0:526:4910 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ba724000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 r4:844b2400 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac67000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85443f8c r4:85443c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85443f8c r4:854ceb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b2400 r8:854ceb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ceb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ceb00 r8:8027ecf4 r7:eb4dde60 r6:854ceb80 r5:844b2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ddc40 INFO: task kworker/0:527:4912 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe8709fb0 to 0xe8709ff8) INFO: task kworker/0:528:4915 blocked for more than 475 seconds. Call trace: [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eafe1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b3000 r8:854cec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854cec00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cec00 r8:8027ecf4 r7:eb4dde60 r6:854cec80 r5:844b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ddf80 INFO: task kworker/0:528:4915 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bb126000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4916 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:844b3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddfc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544878c r4:85448400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544878c r4:854ced00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b3c00 r8:854ced2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ced00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ced00 r8:8027ecf4 r7:eb4f5e60 r6:854ced80 r5:844b3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb41dfb0 to 0xeb41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4920 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:844b4800 r4:844b4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abf80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae87000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448b8c r4:85448800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85448b8c r4:854cee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b4800 r8:854cee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854cee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cee00 r8:8027ecf4 r7:eb4f5e60 r6:854cee80 r5:844b4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2080 INFO: task kworker/0:530:4920 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bbc53000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4921 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb501d84 r8:00000002 r7:60000013 r6:eb501d8c r5:844b5400 r4:844b5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854cef00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2240 INFO: task kworker/0:531:4921 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bbc53000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:4923 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:844b6000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb509d84 r8:00000002 r7:60000113 r6:eb509d8c r5:844b6c00 r4:844b6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85449b8c r4:85449800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85449b8c r4:854f6100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b6c00 r8:854f612c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6100 r8:8027ecf4 r7:eb4f5e60 r6:854f6180 r5:844b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2340 INFO: task kworker/0:533:4925 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bc979000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85476c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544a38c r4:8544a000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544a38c r4:854f6200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:85475400 r8:854f632c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:536 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r5:8544a78c r4:8544a400 r4:00000001 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bd40b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r4:853f0000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb521fb0 to 0xeb521ff8) Call trace: r4:82ac21e4 r4:00000000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4935 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:853f3000 r4:853f3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544ab8c r4:8544a800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544ab8c r4:854f6500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f3000 r8:854f652c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6500 r8:8027ecf4 r7:eb521e60 r6:85376d80 r5:853f3000 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:539 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:853f3c00 r4:853f3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2f00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b38c r4:8544b000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544b38c r4:854f6580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f3c00 r8:854f65ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6580 r8:8027ecf4 r7:eb521e60 r6:85376e00 r5:853f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2a00 INFO: task kworker/0:539:4936 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bdbe6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d60: 80000013 ffffffff r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:853f5400 r4:853f5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2eb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bb8c r4:8544b800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544bb8c r4:854f6600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f5400 r8:854f662c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6600 r8:8027ecf4 r7:eb529e60 r6:85376e80 r5:853f5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2d00 INFO: task kworker/0:540:4939 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bdf52000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:4940 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:853f6000 r4:853f6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2f80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b78c r4:8544b400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544b78c r4:854f6680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f6000 r8:854f66ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6680 r8:8027ecf4 r7:eb531e60 r6:85376f00 r5:853f6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2d00 INFO: task kworker/0:541:4940 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: be817000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545038c r4:85450000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545038c r4:854f6700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f6c00 r8:854f672c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6700 r8:8027ecf4 r7:eb531e60 r6:85376f80 r5:853f6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501100 INFO: task kworker/0:542:4943 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bf1d0000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4945 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb53dd84 r8:00000002 r7:60000013 r6:eb53dd8c r5:853f4800 r4:853f4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb303000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bf8c r4:8544bc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544bf8c r4:854f6780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f4800 r8:854f67ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb53dfb0 to 0xeb53dff8) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:4947 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:853f1800 r4:853f1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4950 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:853e8c00 r4:853e8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545078c r4:85450400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545078c r4:854f6880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:854f68ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6880 r8:8027ecf4 r7:eb541e60 r6:85504100 r5:853e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855010c0 INFO: task kworker/0:545:4950 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bfc61000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4951 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4951 tgid:4951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:853f8000 r4:853f8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2e40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c578c r4:847c5400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c578c r4:85504180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f8000 r8:855041ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504180 r8:8027ecf4 r7:eb345e60 r6:85504200 r5:853f8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ebbc0 INFO: task kworker/1:365:4951 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bffc9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:844bb800 task:kworker/0:546 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb575000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85450f8c r4:85450c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85450f8c r4:854f6900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f8c00 r8:854f692c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6900 r8:8027ecf4 r7:eb541e60 r6:85504280 r5:853f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855010c0 INFO: task kworker/0:546:4953 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0109000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4954 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb549d84 r8:00000002 r7:60000013 r6:eb549d8c r5:853f9800 r4:853f9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d038c r4:853d0000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d038c r4:85504300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f9800 r8:8550432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504300 r8:8027ecf4 r7:eb519e60 r6:85504380 r5:853f9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854eb2c0 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0269000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) r4:844bb800 task:kworker/1:367 state:D stack:0 pid:4956 tgid:4956 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff340 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d078c r4:853d0400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d078c r4:85504400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fa400 r8:8550442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504400 r8:8027ecf4 r7:eb549e60 r6:85504480 r5:853fa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff080 INFO: task kworker/1:367:4956 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0504000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:4958 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:853fb000 r4:853fb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d0b8c r4:853d0800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d0b8c r4:85504500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fb000 r8:8550452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504500 r8:8027ecf4 r7:eb545e60 r6:85504580 r5:853fb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff1c0 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0963000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r5:80000013 r4:80239bb0 r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4960 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:853fbc00 r4:853fbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d1b8c r4:853d1800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d1b8c r4:85504600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fbc00 r8:8550462c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504600 r8:8027ecf4 r7:eb54de60 r6:85504680 r5:853fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff300 INFO: task kworker/1:369:4960 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb559000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d0f8c r4:853d0c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d0f8c r4:85504700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fc800 r8:8550472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504700 r8:8027ecf4 r7:eb551e60 r6:85504780 r5:853fc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff300 INFO: task kworker/1:370:4961 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe8709d20 to 0xe8709d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:853fd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ffd80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d138c r4:853d1000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d138c r4:85504800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fd400 r8:8550482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504800 r8:8027ecf4 r7:eb551e60 r6:85504880 r5:853fd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff5c0 INFO: task kworker/1:371:4964 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c1162000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:547 state:D stack:0 pid:4967 tgid:4967 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:853fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545278c r4:85452400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545278c r4:854f6980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fe000 r8:854f69ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6980 r8:8027ecf4 r7:eb4fde60 r6:85504900 r5:853fe000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb591fb0 to 0xeb591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501a80 INFO: task kworker/0:547:4967 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c1240000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4968 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8545138c r4:85451000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545138c r4:854f6a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400000 r8:854f6a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6a00 r8:8027ecf4 r7:eb591e60 r6:85504980 r5:85400000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501a80 INFO: task kworker/0:548:4968 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c16c7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85401800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85401800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545178c r4:85451400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545178c r4:854f6a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85401800 r8:854f6aac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6a80 r8:8027ecf4 r7:eb591e60 r6:85504a00 r5:85401800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501b00 INFO: task kworker/0:549:4970 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c196b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:4972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:85400c00 r4:85400c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85400c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85400c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85451b8c r4:85451800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85451b8c r4:854f6b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400c00 r8:854f6b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6b00 r8:8027ecf4 r7:eb591e60 r6:85504a80 r5:85400c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4974 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5bdd84 r8:00000002 r7:60000013 r6:eb5bdd8c r5:85403c00 r4:85403c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85403c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855013c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85403c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85451f8c r4:85451c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85451f8c r4:854f6b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85403c00 r8:854f6bac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6b80 r8:8027ecf4 r7:eb591e60 r6:85504b00 r5:85403c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501e00 INFO: task kworker/0:551:4974 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c2124000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:4977 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:85402400 r4:85402400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85402400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85402400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8545238c r4:854f6c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe8709d20 to 0xe8709d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:84753f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:553 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85405400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85452b8c r4:85452800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85452b8c r4:854f6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85405400 r8:854f6cac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6c80 r8:8027ecf4 r7:eb591e60 r6:85504c00 r5:85405400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855001c0 INFO: task kworker/0:553:4980 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c29d2000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:4982 tgid:4982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:85479800 r4:85479800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85479800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85479800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85452f8c r4:85452c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85452f8c r4:854f6d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85479800 r8:854f6d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4984 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:8547b000 r4:8547b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855007c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547b000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545338c r4:85453000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545338c r4:854f6e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547b000 r8:854f6e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6e00 r8:8027ecf4 r7:eb5b9e60 r6:854f6e80 r5:8547b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500400 INFO: task kworker/0:555:4984 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c35a9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:4985 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:8547bc00 r4:8547bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855008c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0599000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545378c r4:85453400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545378c r4:854f6f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547bc00 r8:854f6f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6f00 r8:8027ecf4 r7:eb5e1e60 r6:854f6f80 r5:8547bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500400 INFO: task kworker/0:556:4985 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c384a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:4989 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:8547d400 r4:8547d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500a00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0671000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85453b8c r4:85453800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85453b8c r4:854fc000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547d400 r8:854fc02c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc000 r8:8027ecf4 r7:eb579e60 r6:854fc080 r5:8547d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855006c0 INFO: task kworker/0:557:4989 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c3bb1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:4990 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f9d84 r8:00000002 r7:60000013 r6:eb5f9d8c r5:8547e000 r4:8547e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea977000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545438c r4:85454000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545438c r4:854fc100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547e000 r8:854fc12c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc100 r8:8027ecf4 r7:eb5f5e60 r6:854fc180 r5:8547e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500880 INFO: task kworker/0:558:4990 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c40dc000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:4992 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb479d84 r8:00000002 r7:60000013 r6:eb479d8c r5:8547c800 r4:8547c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:854fc200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c44d4000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:4994 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85478000 r4:85478000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85478000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855024c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85478000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454b8c r4:85454800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85454b8c r4:854fc300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85478000 r8:854fc32c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc300 r8:8027ecf4 r7:eb5f9e60 r6:854fc380 r5:85478000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4997 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4997 tgid:4997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:8547ec00 r4:8547ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eacef000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe8709d20 to 0xe8709d68) r4:82ac21e4 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4998 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:85480000 r4:85480000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85480000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502340 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85480000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85480000 r8:854fc4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85500080 Call trace: 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:4999 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:373 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:85480c00 r4:85480c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85480c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567e440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85480c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d3b8c r4:853d3800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d3b8c r4:85504d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85480c00 r8:85504d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504d00 r8:8027ecf4 r7:eb60de60 r6:854fc580 r5:85480c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550f2c0 INFO: task kworker/1:373:4999 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c4f7f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:5001 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:85481800 r4:85481800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85481800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85481800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d238c r4:853d2000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d238c r4:85504d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85481800 r8:85504dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504d80 r8:8027ecf4 r7:eb619e60 r6:854fc600 r5:85481800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550f2c0 INFO: task kworker/1:374:5001 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c5200000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:5004 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:85483c00 r4:85483c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85483c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855028c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85483c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf29000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545538c r4:85455000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545538c r4:854fc680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85483c00 r8:854fc6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc680 r8:8027ecf4 r7:eb601e60 r6:854fc700 r5:85483c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855022c0 INFO: task kworker/0:562:5004 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c55f6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:5006 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:5006 tgid:5006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:85484800 r4:85484800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85484800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85484800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae17000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454f8c r4:85454c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85454f8c r4:854fc780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85484800 r8:854fc7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc780 r8:8027ecf4 r7:eb621e60 r6:854fc800 r5:85484800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855025c0 INFO: task kworker/0:563:5006 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c55f6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:5008 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb611d84 r8:00000002 r7:60000013 r6:eb611d8c r5:85485400 r4:85485400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85485400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502a80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85485400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545578c r4:85455400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545578c r4:854fc880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85485400 r8:854fc8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc880 r8:8027ecf4 r7:eb621e60 r6:854fc900 r5:85485400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855025c0 INFO: task kworker/0:564:5008 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c57e8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:5010 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5fdd84 r8:00000002 r7:60000013 r6:eb5fdd8c r5:85482400 r4:85482400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85482400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85482400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb015000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455b8c r4:85455800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85455b8c r4:854fc980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85482400 r8:854fc9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc980 r8:8027ecf4 r7:eb611e60 r6:854fca00 r5:85482400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85502900 INFO: task kworker/0:565:5010 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c5ab6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:5013 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:85486c00 r4:85486c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85486c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502cc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85486c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455f8c r4:85455c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85455f8c r4:854fca80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85486c00 r8:854fcaac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fca80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fca80 r8:8027ecf4 r7:eb5fde60 r6:854fcb00 r5:85486c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855025c0 INFO: task kworker/0:566:5013 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c5cbc000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:5014 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:85483000 r4:85483000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85483000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85483000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545678c r4:85456400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545678c r4:854fcb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85483000 r8:854fcbac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fcb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fcb80 r8:8027ecf4 r7:eb629e60 r6:854fcc00 r5:85483000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c6261000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:5015 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb631d84 r8:00000002 r7:60000013 r6:eb631d8c r5:85478c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502f40 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545638c r4:85456000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545638c r4:854fcc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85478c00 r8:854fccac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fcc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fcc80 r8:8027ecf4 r7:eb62de60 r6:854fcd00 r5:85478c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85502ac0 INFO: task kworker/0:568:5015 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe8709d20 to 0xe8709d68) r4:82ac21e4 r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:5018 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85406000 r5:85406000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:5021 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:85403000 r4:85403000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85403000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b640 r4:00000000 r9:83018005 r8:85403000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r10:61c88647 r9:85403000 r8:854fce2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80000013 ffffffff r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:5024 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85408000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e8709dc0 r5:85022b8c r4:85022800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:85409800 r4:85409800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85409800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85409800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545738c r4:85457000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545738c r4:854fcf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85409800 r8:854fcf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fcf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fcf00 r8:8027ecf4 r7:eb641e60 r6:85504f80 r5:85409800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b200 INFO: task kworker/0:572:5026 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:5027 blocked for more than 477 seconds. r10:829187f4 r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:8540a400 r5:8540a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb437000 r10:61c88647 r9:8540a400 r8:854fcfac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b4c0 INFO: task kworker/0:573:5027 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c6fab000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:8540b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b7c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb407000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457b8c r4:85457800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85457b8c r4:85511000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540b000 r8:8551102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511000 r8:8027ecf4 r7:eb659e60 r6:85516080 r5:8540b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b4c0 INFO: task kworker/0:574:5028 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c70f3000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:5031 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:85408c00 r4:85408c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85408c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85408c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb415000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85457f8c r4:85511080 r4:00000001 r4:8550b5c0 INFO: task kworker/0:575:5031 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c7343000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:00001000 r4:e0439000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:8540bc00 r4:8540bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8540bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb711000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8555cf8c r4:85516180 Exception stack(0xeb66dfb0 to 0xeb66dff8) r4:8550fd80 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:5033 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:8540d400 r4:8540d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ba40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb423000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555838c r4:85558000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555838c r4:85511100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540d400 r8:8551112c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511100 r8:8027ecf4 r7:eb659e60 r6:85516280 r5:8540d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b780 INFO: task kworker/0:576:5033 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c799a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8540c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550be00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85558f8c r4:85558c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85558f8c r4:85511180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540c800 r8:855111ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85511180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511180 r8:8027ecf4 r7:eb659e60 r6:85516300 r5:8540c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b8c0 INFO: task kworker/0:577:5035 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe8709d20 to 0xe8709d68) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r5:80000013 r4:80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:5038 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb685d84 r8:00000002 r7:60000113 r6:eb685d8c r5:8540e000 r4:8540e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bcc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb445000 r5:85558b8c r4:85558800 r10:61c88647 r9:8540e000 r8:8551122c r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:5039 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb689d84 r8:00000002 r7:60000013 r6:eb689d8c r5:8540ec00 r4:8540ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb473000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555978c r4:85559400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555978c r4:85511280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540ec00 r8:855112ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85511280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511280 r8:8027ecf4 r7:eb679e60 r6:85516400 r5:8540ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550bb40 INFO: task kworker/0:579:5039 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85406c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bf40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85406c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb461000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555938c r4:85559000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555938c r4:85511300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85406c00 r8:8551132c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511300 r8:8027ecf4 r7:eb689e60 r6:85516480 r5:85406c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550bc80 INFO: task kworker/0:580:5041 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe8709d20 to 0xe8709d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:00001000 r4:e0439000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:5043 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb699d84 r8:00000002 r7:60000113 r6:eb699d8c r5:85404800 r4:85404800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85404800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85404800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555af8c r4:8555ac00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555af8c r4:85511380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85404800 r8:855113ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85511380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511380 r8:8027ecf4 r7:eb689e60 r6:85516500 r5:85404800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550bdc0 INFO: task kworker/0:581:5043 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c84d9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:5045 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb635d84 r8:00000002 r7:60000013 r6:eb635d8c r5:85588c00 r4:85588c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85588c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85588c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb487000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85559b8c r4:85559800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85559b8c r4:85511400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85588c00 r8:8551142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511400 r8:8027ecf4 r7:eb699e60 r6:85511480 r5:85588c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550f880 INFO: task kworker/0:582:5045 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c8542000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:5048 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:85589800 r4:85589800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85589800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85589800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb495000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85559f8c r4:85559c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85559f8c r4:85511500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85589800 r8:8551152c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511500 r8:8027ecf4 r7:eb699e60 r6:85511580 r5:85589800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527080 INFO: task kworker/0:583:5048 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c89ae000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:5049 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb69dd84 r8:00000002 r7:60000013 r6:eb69dd8c r5:8558a400 r4:8558a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855272c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a38c r4:8555a000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555a38c r4:85511600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558a400 r8:8551162c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511600 r8:8027ecf4 r7:eb699e60 r6:85511680 r5:8558a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527240 INFO: task kworker/0:584:5049 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c8c01000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:5052 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:8558b000 r4:8558b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a78c r4:8555a400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555a78c r4:85511700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558b000 r8:8551172c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511700 r8:8027ecf4 r7:eb699e60 r6:85511780 r5:8558b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527200 INFO: task kworker/0:585:5052 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c8e1f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:5054 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:8558bc00 r4:8558bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855275c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ab8c r4:8555a800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555ab8c r4:85511800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558bc00 r8:8551182c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511800 r8:8027ecf4 r7:eb699e60 r6:85511880 r5:8558bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527200 INFO: task kworker/0:586:5054 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c92fb000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:5056 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:8558c800 r4:8558c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527a80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555b78c r4:8555b400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555b78c r4:85511900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558c800 r8:8551192c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511900 r8:8027ecf4 r7:eb699e60 r6:85511980 r5:8558c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527600 INFO: task kworker/0:587:5056 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c94fd000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:5058 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6c1d84 r8:00000002 r7:60000113 r6:eb6c1d8c r5:8558d400 r4:8558d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555b38c r4:8555b000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555b38c r4:85511a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558d400 r8:85511a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511a00 r8:8027ecf4 r7:eb6b5e60 r6:85511a80 r5:8558d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527800 INFO: task kworker/0:588:5058 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c94fd000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:5060 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:8558e000 r4:8558e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527c00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555bb8c r4:8555b800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555bb8c r4:85511b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558e000 r8:85511b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511b00 r8:8027ecf4 r7:eb6b5e60 r6:85511b80 r5:8558e000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80000013 ffffffff r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:5062 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8558ec00 r5:8558ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb6e1000 r7:dddced40 r6:83018000 r5:8555bf8c r4:85511c00 r10:61c88647 r9:8558ec00 r8:85511c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511c00 r8:8027ecf4 r7:eb6cde60 r6:85511c80 r5:8558ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527b40 INFO: task kworker/0:590:5062 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c9819000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/0:591:5064 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:85588000 r4:85588000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85588000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527b80 INFO: task kworker/0:591:5064 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c9d3f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8547a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555df8c r4:8555dc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555df8c r4:85511e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547a400 r8:85511e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511e00 r8:8027ecf4 r7:eb6e5e60 r6:85511e80 r5:8547a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527d40 INFO: task kworker/0:592:5066 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c9f48000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:593 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb639d84 r8:00000002 r7:60000113 r6:eb639d8c r5:85486000 r4:85486000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85486000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:85486000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501680 INFO: task kworker/0:593:5067 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ca312000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e0439000 r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:594:5070 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:84a00000 r4:84a00000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a00000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb705000 r10:61c88647 r9:84a00000 r8:8554002c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:595 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb719d84 r8:00000002 r7:60000013 r6:eb719d8c r5:85411800 r4:85411800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85411800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85411800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa43000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555d78c r4:8555d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555d78c r4:85540080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85411800 r8:855400ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540080 r8:8027ecf4 r7:eb6f1e60 r6:85516600 r5:85411800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553f080 INFO: task kworker/0:595:5071 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ca910000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:5075 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb599d84 r8:00000002 r7:60000113 r6:eb599d8c r5:85410c00 r4:85410c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85410c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb53000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555db8c r4:8555d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555db8c r4:85540100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85410c00 r8:8554012c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540100 r8:8027ecf4 r7:eb6f1e60 r6:85516680 r5:85410c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553f580 INFO: task kworker/0:596:5075 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cab3d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe8709fb0 to 0xe8709ff8) Workqueue: events bpf_prog_free_deferred r5:85410000 r4:829187f0 r4:00000000 r5:8555f38c r4:8555f000 dfa0: 00000000 00000000 00000000 00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r5:85022b8c r4:85022800 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:5079 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb735d84 r8:00000002 r7:60000013 r6:eb735d8c r5:85412400 r4:85412400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85412400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85412400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04fb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555e38c r4:8555e000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85540200 r8:8027ecf4 r7:eb72de60 r6:85516780 r5:85412400 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85413000 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb73dfb0 to 0xeb73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553fb00 INFO: task kworker/0:599:5081 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: caea1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5083 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb745d84 r8:00000002 r7:60000113 r6:eb745d8c r5:85415400 r4:85415400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85415400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fd80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85415400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555eb8c r4:8555e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555eb8c r4:85540300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85415400 r8:8554032c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540300 r8:8027ecf4 r7:eb72de60 r6:85516880 r5:85415400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:600:5083 is blocked on a mutex likely owned by task kworker/0:153:3780. Exception stack(0xe8709d20 to 0xe8709d68) r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85416c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85416c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fe80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85416c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac99000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ef8c r4:8555ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555ef8c r4:85540380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85416c00 r8:855403ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540380 r8:8027ecf4 r7:eb72de60 r6:85516980 r5:85416c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553fc00 INFO: task kworker/0:601:5086 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cb6c3000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:5087 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:853fec00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d278c r4:853d2400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d278c r4:85516900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fec00 r8:8551692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85516900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85516900 r8:8027ecf4 r7:eb619e60 r6:85516a00 r5:853fec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85526800 INFO: task kworker/1:376:5087 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cba0a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:5088 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:eb759d84 r8:00000002 r7:60000013 r6:eb759d8c r5:85413c00 r5:85413c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:eae95000 r7:dddced40 r6:83018000 r5:8555f78c r4:85540400 Exception stack(0xeb759fb0 to 0xeb759ff8) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:603 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85416000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f240 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85416000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555fb8c r4:8555f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555fb8c r4:85540480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85416000 r8:855404ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540480 r8:8027ecf4 r7:eb759e60 r6:85516b00 r5:85416000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553fd00 INFO: task kworker/0:603:5090 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cbf66000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:5092 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:85598c00 r4:85598c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85598c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce0c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85598c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85598c00 r8:8554052c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cc27e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85598000 r5:85598000 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cc3b0000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:606 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:85599800 r4:85599800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85599800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85599800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb107000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556038c r4:85560000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8556038c r4:85540600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85599800 r8:8554062c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85540600 r8:8027ecf4 r7:eb769e60 r6:85516c80 r5:85599800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:607:5098 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred r5:8559a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85560b8c r4:85560800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85560b8c r4:85540680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559a400 r8:855406ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540680 r8:8027ecf4 r7:eb769e60 r6:85516d00 r5:8559a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ce100 INFO: task kworker/0:607:5098 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cc779000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8559d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85560f8c r4:85560c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85560f8c r4:85540700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559d400 r8:8554072c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85540700 r8:8027ecf4 r7:eb781e60 r6:85516d80 r5:8559d400 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:5103 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:8559e000 r4:8559e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb1eb000 r10:61c88647 r9:8559e000 r8:855407ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bb0 r4:00000000 r5:00001000 r4:e0439000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8559c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce6c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556178c r4:85561400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8556178c r4:85540800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559c800 r8:8554082c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540800 r8:8027ecf4 r7:eb791e60 r6:85516e80 r5:8559c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ce3c0 INFO: task kworker/0:610:5106 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cd4ff000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 r5:00001000 r4:e0439000 r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8559bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:85561f8c r4:85561c00 r10:61c88647 r9:8559bc00 r8:855408ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540880 r8:8027ecf4 r7:eb799e60 r6:85516f00 r5:8559bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ce5c0 INFO: task kworker/0:611:5107 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cd8fe000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:8559ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85561b8c r4:85561800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85561b8c r4:85540900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559ec00 r8:8554092c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540900 r8:8027ecf4 r7:eb79de60 r6:85516f80 r5:8559ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:613 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8559b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ceb80 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:00001000 r4:e0439000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85414800 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cecc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85414800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556278c r4:85562400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8556278c r4:85540a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85414800 r8:85540a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540a00 r8:8027ecf4 r7:eb7a5e60 r6:855d9080 r5:85414800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cea00 INFO: task kworker/0:614:5113 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ce4e8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85590000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ce974000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:5117 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7b1d84 r8:00000002 r7:60000013 r6:eb7b1d8c r5:85590c00 r4:85590c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85590c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)