Extracting prog: 5m35.130128574s Minimizing prog: 1h15m48.282030441s Simplifying prog options: 0s Extracting C: 8m37.938553124s Simplifying C: 58m43.699368619s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h28m45.050117159s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8323e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd86c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85937f8c r4:85937c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85937f8c r4:830b8400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ecf4 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:1:47 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df921d84 r8:00000002 r7:60000113 r6:df921d8c r5:833abc00 r4:833abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e578c r4:851e5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e578c r4:832a1200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833abc00 r8:832a122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1200 r8:8027ecf4 r7:df879e60 r6:8336bd80 r5:833abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832a2280 INFO: task kworker/1:1:47 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:2:725 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:725 tgid:725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e03b5d84 r8:00000002 r7:60000113 r6:e03b5d8c r5:83ac6000 r4:83ac6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ac6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d9b8c r4:855d9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855d9b8c r4:8387f900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6000 r8:8387f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8387f900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8387f900 r8:8027ecf4 r7:df879e60 r6:8387ff00 r5:83ac6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03b5fb0 to 0xe03b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:83bed440 INFO: task kworker/1:2:725 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:0:3116 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df951d84 r8:00000002 r7:60000013 r6:df951d8c r5:841ab000 r4:841ab000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ab000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df951e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e07e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0cf8c r4:84c0cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84c0cf8c r4:845bde00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841ab000 r8:845bde2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bde00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bde00 r8:8027ecf4 r7:e03b5e60 r6:845bde80 r5:841ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf951fb0 to 0xdf951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:830b7a00 INFO: task kworker/1:0:3116 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:3:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df989d84 r8:00000002 r7:60000113 r6:df989d8c r5:841a9800 r4:841a9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841a9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df989e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d8f8c r4:855d8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855d8f8c r4:845bdf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841a9800 r8:845bdf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bdf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bdf00 r8:8027ecf4 r7:e03b5e60 r6:845bdf80 r5:841a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf989fb0 to 0xdf989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db51c0 INFO: task kworker/1:3:3122 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:9:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83ac4800 r4:83ac4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e004c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0649000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503bf8c r4:8503bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503bf8c r4:84489d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac4800 r8:84489d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84489d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84489d00 r8:8027ecf4 r7:df9dde60 r6:830b8600 r5:83ac4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6a80 INFO: task kworker/0:9:3135 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:10:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:840c9800 r4:840c9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840c9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0641000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fc78c r4:847fc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847fc78c r4:830b8500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840c9800 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ecf4 r7:df9d5e60 r6:84161700 r5:840c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6a80 INFO: task kworker/0:10:3137 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:11:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:840c8000 r4:840c8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840c8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fff8c r4:847ffc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847fff8c r4:832a1080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840c8000 r8:832a10ac r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1080 r8:8027ecf4 r7:df9f1e60 r6:832a1000 r5:840c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6f80 INFO: task kworker/0:11:3139 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:12:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:838a6c00 r4:838a6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838a6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dbf8c r4:851dbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851dbf8c r4:832a1300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a6c00 r8:832a132c r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1300 r8:8027ecf4 r7:df9f1e60 r6:845bdd80 r5:838a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2100 INFO: task kworker/0:12:3142 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:13:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:840ca400 r4:840ca400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840ca400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea985000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506cf8c r4:8506cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506cf8c r4:832a1280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ca400 r8:832a12ac r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1280 r8:8027ecf4 r7:dfa09e60 r6:832a1680 r5:840ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2340 INFO: task kworker/0:13:3143 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:840ce000 r4:840ce000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840ce000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d90000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506f78c r4:8506f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506f78c r4:832a1c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ce000 r8:832a1c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1c00 r8:8027ecf4 r7:dfa09e60 r6:832a1600 r5:840ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd21c0 INFO: task kworker/0:14:3145 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:840cc800 r4:840cc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840cc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c04b8c r4:84c04800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c04b8c r4:832a1b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840cc800 r8:832a1bac r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1b80 r8:8027ecf4 r7:dfa09e60 r6:8416fe00 r5:840cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2500 INFO: task kworker/0:15:3148 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3149 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:83ac1800 r4:83ac1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459c440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c05f8c r4:84c05c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c05f8c r4:844c1780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:844c17ac r7:82804d40 r6:dddced40 r5:dddced60 r4:844c1780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c1780 r8:8027ecf4 r7:dfa09e60 r6:844a5b00 r5:83ac1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2600 INFO: task kworker/0:16:3149 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:83a93c00 r4:83a93c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a93c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85171b8c r4:85171800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85171b8c r4:844a5e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93c00 r8:844a5e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844a5e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844a5e00 r8:8027ecf4 r7:dfa29e60 r6:84e02000 r5:83a93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2600 INFO: task kworker/0:17:3151 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3155 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:83aae000 r4:83aae000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aae000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff91000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85171f8c r4:85171c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85171f8c r4:84e02080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aae000 r8:84e020ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02080 r8:8027ecf4 r7:dfa29e60 r6:84e02100 r5:83aae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2bc0 INFO: task kworker/0:18:3155 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3157 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83aaa400 r4:83aaa400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aaa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459c880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aaa400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c05b8c r4:84c05800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c05b8c r4:84e02200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aaa400 r8:84e0222c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02200 r8:8027ecf4 r7:dfa29e60 r6:84e02180 r5:83aaa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2c40 INFO: task kworker/0:19:3157 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3159 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:840cbc00 r4:840cbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840cbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ab80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0393000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c878c r4:852c8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852c878c r4:84e02280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840cbc00 r8:84e022ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02280 r8:8027ecf4 r7:dfa29e60 r6:84e02300 r5:840cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2d40 INFO: task kworker/0:20:3159 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa69d84 r8:00000002 r7:60000013 r6:dfa69d8c r5:8418d400 r4:8418d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8418d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8418d400 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540a38c r4:8540a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8540a38c r4:84e02380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8418d400 r8:84e023ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02380 r8:8027ecf4 r7:dfa61e60 r6:84e02400 r5:8418d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2fc0 INFO: task kworker/0:21:3161 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:8418e000 r4:8418e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8418e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546b8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8418e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f7f8c r4:853f7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853f7f8c r4:84e02480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8418e000 r8:84e024ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02480 r8:8027ecf4 r7:dfa69e60 r6:84e02500 r5:8418e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07080 INFO: task kworker/0:22:3163 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:832e8000 r4:832e8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832e8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546b300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c9b8c r4:852c9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852c9b8c r4:84e02580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e8000 r8:84e025ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02580 r8:8027ecf4 r7:dfa69e60 r6:84e02600 r5:832e8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07300 INFO: task kworker/0:23:3164 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:832e9800 r4:832e9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832e9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852caf8c r4:852cac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852caf8c r4:84e02680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e9800 r8:84e026ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02680 r8:8027ecf4 r7:dfa69e60 r6:84e02700 r5:832e9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07180 INFO: task kworker/0:24:3166 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3169 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:832ebc00 r4:832ebc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832ebc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d5b8c r4:854d5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d5b8c r4:84e02780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ebc00 r8:84e027ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02780 r8:8027ecf4 r7:dfa7de60 r6:84e02800 r5:832ebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07480 INFO: task kworker/0:25:3169 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaa5d84 r8:00000002 r7:60000013 r6:dfaa5d8c r5:841ae000 r4:841ae000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845890c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:841ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d678c r4:854d6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d678c r4:84e02880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841ae000 r8:84e028ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02880 r8:8027ecf4 r7:dfa89e60 r6:845bdc80 r5:841ae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07480 INFO: task kworker/0:26:3170 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:838a4800 r4:838a4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838a4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84567340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85703f8c r4:85703c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85703f8c r4:84e02900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a4800 r8:84e0292c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02900 r8:8027ecf4 r7:dfa89e60 r6:845bdb00 r5:838a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07800 INFO: task kworker/0:27:3173 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:8324a400 r4:8324a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8324a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523df00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d738c r4:854d7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d738c r4:84e02980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:84e029ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02980 r8:8027ecf4 r7:dfab9e60 r6:845bdb80 r5:8324a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07800 INFO: task kworker/0:28:3174 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfad1d84 r8:00000002 r7:60000013 r6:dfad1d8c r5:83fb6c00 r4:83fb6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83fb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0c38c r4:84c0c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0c38c r4:84e02a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb6c00 r8:84e02a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02a00 r8:8027ecf4 r7:dfab9e60 r6:845bdc00 r5:83fb6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07840 INFO: task kworker/0:29:3176 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:83fb6000 r4:83fb6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83fb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566d78c r4:8566d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566d78c r4:84e02a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb6000 r8:84e02aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02a80 r8:8027ecf4 r7:dfab9e60 r6:845bda80 r5:83fb6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07b00 INFO: task kworker/0:30:3179 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfac5d84 r8:00000002 r7:60000013 r6:dfac5d8c r5:83fb4800 r4:83fb4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83fb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566c78c r4:8566c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566c78c r4:845bda00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb4800 r8:845bda2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bda00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bda00 r8:8027ecf4 r7:e03b5e60 r6:845bd980 r5:83fb4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca00c0 INFO: task kworker/1:4:3181 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:841abc00 r4:841abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845364c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c4f8c r4:856c4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c4f8c r4:845bd900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841abc00 r8:845bd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd900 r8:8027ecf4 r7:dfac5e60 r6:845bd880 r5:841abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca01c0 INFO: task kworker/1:5:3183 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaf9d84 r8:00000002 r7:60000013 r6:dfaf9d8c r5:83ad6c00 r4:83ad6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551b380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bfb8c r4:856bf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bfb8c r4:845bd800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad6c00 r8:845bd82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd800 r8:8027ecf4 r7:dfae5e60 r6:845bd780 r5:83ad6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca0340 INFO: task kworker/1:6:3185 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb01d84 r8:00000002 r7:60000013 r6:dfb01d8c r5:83fb0000 r4:83fb0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ded2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83fb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb739000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566e38c r4:8566e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566e38c r4:84e02b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb0000 r8:84e02bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02b80 r8:8027ecf4 r7:dfab9e60 r6:845bd700 r5:83fb0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07d00 INFO: task kworker/0:31:3187 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83ad2400 r4:83ad2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85113f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad2400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb779000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570378c r4:85703400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8570378c r4:84e02c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad2400 r8:84e02c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02c00 r8:8027ecf4 r7:dfab9e60 r6:845bd680 r5:83ad2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07e00 INFO: task kworker/0:32:3188 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:839cbc00 r4:839cbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c4b8c r4:856c4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c4b8c r4:845bd600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cbc00 r8:845bd62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd600 r8:8027ecf4 r7:dfae5e60 r6:845bd480 r5:839cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca07c0 INFO: task kworker/1:7:3191 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:839cec00 r4:839cec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84567f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85710b8c r4:85710800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85710b8c r4:84e02c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cec00 r8:84e02cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02c80 r8:8027ecf4 r7:dfab9e60 r6:845bd500 r5:839cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1000 INFO: task kworker/0:33:3192 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:839cd400 r4:839cd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571178c r4:85711400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571178c r4:84e02d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cd400 r8:84e02d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02d00 r8:8027ecf4 r7:dfb21e60 r6:845bd580 r5:839cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1140 INFO: task kworker/0:34:3194 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:839c9800 r4:839c9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839c9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd85c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85937b8c r4:85937800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85937b8c r4:84e02d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c9800 r8:84e02dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02d80 r8:8027ecf4 r7:dfb31e60 r6:845bd400 r5:839c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1280 INFO: task kworker/0:35:3196 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:839c8c00 r4:839c8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839c8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8de00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f201000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc578c r4:85bc5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc578c r4:84e02e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c8c00 r8:84e02e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02e00 r8:8027ecf4 r7:dfb3de60 r6:845bd380 r5:839c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca13c0 INFO: task kworker/0:36:3198 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb49d84 r8:00000002 r7:60000013 r6:dfb49d8c r5:839cb000 r4:839cb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c538c r4:856c5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c538c r4:845bd300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cb000 r8:845bd32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd300 r8:8027ecf4 r7:dfae5e60 r6:845bd100 r5:839cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca0800 INFO: task kworker/1:8:3202 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:839c8000 r4:839c8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839c8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c578c r4:856c5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c578c r4:845bd000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c8000 r8:845bd02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd000 r8:8027ecf4 r7:dfb49e60 r6:845bd080 r5:839c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca0800 INFO: task kworker/1:9:3203 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83ad0c00 r4:83ad0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ad0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba01000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c5b8c r4:856c5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c5b8c r4:845bd200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad0c00 r8:845bd22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd200 r8:8027ecf4 r7:dfaf1e60 r6:845bd280 r5:83ad0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3080 INFO: task kworker/1:10:3206 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84cd8000 r4:84cd8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845365c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c5f8c r4:856c5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c5f8c r4:845bd180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd8000 r8:845bd1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd180 r8:8027ecf4 r7:dfb55e60 r6:843dfc00 r5:84cd8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3240 INFO: task kworker/1:11:3208 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:84cd8c00 r4:84cd8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cd8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c678c r4:856c6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c678c r4:830cd100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd8c00 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ecf4 r7:dfb59e60 r6:830cd080 r5:84cd8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3180 INFO: task kworker/1:12:3210 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:84cd9800 r4:84cd9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845368c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c638c r4:856c6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c638c r4:84ca6000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd9800 r8:84ca602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6000 r8:8027ecf4 r7:dfb5de60 r6:84ca6080 r5:84cd9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3340 INFO: task kworker/1:13:3212 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:84cdb000 r4:84cdb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c6f8c r4:856c6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c6f8c r4:84ca6100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdb000 r8:84ca612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6100 r8:8027ecf4 r7:dfb5de60 r6:84ca6180 r5:84cdb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3500 INFO: task kworker/1:14:3214 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:84cdc800 r4:84cdc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c7b8c r4:856c7800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c7b8c r4:84ca6200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdc800 r8:84ca622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6200 r8:8027ecf4 r7:dfa91e60 r6:84ca6280 r5:84cdc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3700 INFO: task kworker/1:15:3215 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:84cdbc00 r4:84cdbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cdbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c738c r4:856c7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c738c r4:84ca6300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdbc00 r8:84ca632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6300 r8:8027ecf4 r7:dfb69e60 r6:84ca6380 r5:84cdbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd35c0 INFO: task kworker/1:16:3218 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:84cdd400 r4:84cdd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8dcc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cdd400 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec779000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc538c r4:85bc5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc538c r4:84e02f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdd400 r8:84e02f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02f00 r8:8027ecf4 r7:dfb3de60 r6:84ca6400 r5:84cdd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1dc0 INFO: task kworker/0:37:3219 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3221 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84cda400 r4:84cda400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cda400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:8500f640 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:84098000 r4:84098000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84098000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd82c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84098000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84e02e80 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84098c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r10:61c88647 r9:84098c00 r8:84ca65ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3228 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84099800 r4:829189bc r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:e06c9dc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:84ca6780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6780 r8:8027ecf4 r7:dfb71e60 r6:84ca6800 r5:8409a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca2240 INFO: task kworker/1:19:3230 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8409b000 r5:8409b000 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 r5:00001000 r4:eda49000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:8409c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8409c800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:21:3234 is blocked on a mutex likely owned by task kworker/0:73:3846. r4:00000000 r4:84ffea80 r4:8500f640 r5:832ee000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:832ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c9b8c r4:856c9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c9b8c r4:84ca6a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ee000 r8:84ca6aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6a80 r8:8027ecf4 r7:dfbc1e60 r6:84d4d000 r5:832ee000 Exception stack(0xdfbddfb0 to 0xdfbddff8) r5:800f0013 r4:80239bb0 r5:00001000 r4:eda49000 r4:00000001 INFO: task kworker/1:23:3238 blocked for more than 451 seconds. r5:832fb000 r4:829189bc r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:832f9800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3241 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:838b2400 r4:838b2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06c9d20 to 0xe06c9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r4:84ffea80 r4:8500f640 r5:83fc3c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c9f8c r4:856c9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c9f8c r4:84ca6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc3c00 r8:84ca6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6c80 r8:8027ecf4 r7:dfbf9e60 r6:84d4d200 r5:83fc3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 9d60: 800f0013 ffffffff [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:27:3246 blocked for more than 451 seconds. r5:83fc4800 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e06c9dc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r10:61c88647 r9:83fc6000 r8:84ca6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:85e2bb8c r4:85e2b800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:83fc3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83fc3000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cab8c r4:856ca800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cab8c r4:84ca6e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc3000 r8:84ca6e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6e00 r8:8027ecf4 r7:dfc19e60 r6:84d4d380 r5:83fc3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:832f8c00 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9b80 9fa0: 00000000 00000000 00000000 00000000 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:31:3253 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc4dd84 r8:00000002 r7:60000013 r6:dfc4dd8c r5:83fc2400 r5:83fc2400 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:00001000 r4:eda49000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:845f0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551cf80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:845f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cbf8c r4:856cbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cbf8c r4:84e06000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e06c9dc0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r5:845f0c00 r4:829189bc r9:83018005 r8:845f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:33:3260 blocked for more than 451 seconds. r5:845f1800 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cbb8c r4:856cb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cbb8c r4:84e06080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845f1800 r8:84e060ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06080 r8:8027ecf4 r7:dfbb5e60 r6:84d4d680 r5:845f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d48100 INFO: task kworker/1:33:3260 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3263 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:845f2400 r5:845f2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:34:3263 is blocked on a mutex likely owned by task kworker/0:73:3846. Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8409e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ebc71000 r4:84e06180 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 r5:8409d400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe06c9d20 to 0xe06c9d68) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 r5:838b5400 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd8900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f2ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85de4b8c r4:85de4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85de4b8c r4:84d4d800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b5400 r8:84d4d82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d4d800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d4d800 r8:8027ecf4 r7:dfc5de60 r6:84e06300 r5:838b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 INFO: task kworker/0:44:3272 blocked for more than 451 seconds. r5:84cde000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd8a80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e06c9dc0 r5:85e2bb8c r4:85e2b800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:845f3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845f3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dba040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:845f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cc38c r4:856cc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cc38c r4:84e06480 5fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:845f3000 r4:829189bc r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3280 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:845f5400 r4:845f5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845f5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ebd31000 9fa0: 00000000 00000000 00000000 00000000 9d60: 800f0013 ffffffff r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 9fa0: 00000000 00000000 00000000 00000000 r5:845f6000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:e06c9dc0 r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3284 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc99d84 r8:00000002 r7:60000113 r6:dfc99d8c r5:84d10c00 r4:84d10c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d10c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dba8c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:84d11800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r10:61c88647 r9:84d11800 r8:84e068ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:84ffea80 r4:8500f640 Workqueue: events bpf_prog_free_deferred r5:84d10000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d10000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d0f8c r4:856d0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d0f8c r4:84e06900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d10000 r8:84e0692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06900 r8:8027ecf4 r7:dfc99e60 r6:84d4de00 r5:84d10000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:43:3290 is blocked on a mutex likely owned by task kworker/0:73:3846. [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000001 task:kworker/1:44 state:D stack:0 pid:3292 tgid:3292 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84d13000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbae00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:8500f640 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:00001000 r4:ec6c5000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:84e06a00 Call trace: r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d038c r4:856d0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d038c r4:84e06a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d13c00 r8:84e06aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06a80 r8:8027ecf4 r7:dfcb5e60 r6:84db8000 r5:84d13c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2640 INFO: task kworker/1:47:3298 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:84e06b00 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3302 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:84d80000 r4:84d80000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d80000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d80000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec63d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cfb8c r4:856cf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cfb8c r4:84e06b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d80000 r8:84e06bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06b80 r8:8027ecf4 r7:dfcb5e60 r6:84db8100 r5:84d80000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2880 INFO: task kworker/1:49:3302 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3304 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcedd84 r8:00000002 r7:60000113 r6:dfcedd8c r5:84d81800 r4:84d81800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d81800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbaac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d81800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ceb8c r4:856ce800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ceb8c r4:84e06c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d81800 r8:84e06c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06c00 r8:8027ecf4 r7:dfcb5e60 r6:84db8180 r5:84d81800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e2bb8c r4:85e2b800 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbadc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec61f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cf38c r4:856cf000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cf38c r4:84e06c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d80c00 r8:84e06cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06c80 r8:8027ecf4 r7:dfcede60 r6:84db8200 r5:84d80c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2e00 INFO: task kworker/1:51:3306 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3308 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3308 tgid:3308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd0dd84 r8:00000002 r7:60000113 r6:dfd0dd8c r5:84d82400 r4:84d82400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d82400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbac00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d82400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec605000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cef8c r4:856cec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cef8c r4:84e06d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d82400 r8:84e06d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06d00 r8:8027ecf4 r7:dfcede60 r6:84db8280 r5:84d82400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2f00 INFO: task kworker/1:52:3308 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3310 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3310 tgid:3310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:84d83000 r4:84d83000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d83000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851056c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d83000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d1b8c r4:856d1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d1b8c r4:84e06d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d83000 r8:84e06dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06d80 r8:8027ecf4 r7:dfcede60 r6:84db8300 r5:84d83000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d4e440 INFO: task kworker/1:53:3310 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3312 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:84d83c00 r4:84d83c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d83c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d138c r4:856d1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d138c r4:84e06e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d83c00 r8:84e06e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06e00 r8:8027ecf4 r7:dfd1de60 r6:84db8380 r5:84d83c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99080 INFO: task kworker/1:54:3312 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3314 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3314 tgid:3314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd39d84 r8:00000002 r7:60000113 r6:dfd39d8c r5:84d84800 r4:84d84800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d84800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d84800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d178c r4:856d1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d178c r4:84e06e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d84800 r8:84e06eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06e80 r8:8027ecf4 r7:dfd1de60 r6:84db8400 r5:84d84800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd39fb0 to 0xdfd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d992c0 INFO: task kworker/1:55:3314 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85e2bb8c r4:85e2b800 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3317 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:84d86000 r4:84d86000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d86000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851057c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d86000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb549000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d1f8c r4:856d1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d1f8c r4:84e06f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d86000 r8:84e06f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06f00 r8:8027ecf4 r7:dfd1de60 r6:84db8480 r5:84d86000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d992c0 INFO: task kworker/1:56:3317 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3318 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3318 tgid:3318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:84d86c00 r4:84d86c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d86c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851058c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d238c r4:856d2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d238c r4:84e06f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d86c00 r8:84e06fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06f80 r8:8027ecf4 r7:dfd41e60 r6:84db8500 r5:84d86c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd4dfb0 to 0xdfd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99480 INFO: task kworker/1:57:3318 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3322 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd5dd84 r8:00000002 r7:60000113 r6:dfd5dd8c r5:84d14800 r4:84d14800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d14800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851059c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d14800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb837000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d278c r4:856d2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d278c r4:84da1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d14800 r8:84da102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1000 r8:8027ecf4 r7:dfd59e60 r6:84db8600 r5:84d14800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd5dfb0 to 0xdfd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99540 INFO: task kworker/1:59:3322 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3324 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3324 tgid:3324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd6dd84 r8:00000002 r7:60000113 r6:dfd6dd8c r5:84d70c00 r4:84d70c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d70c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd6de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d2b8c r4:856d2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d2b8c r4:84da1080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d70c00 r8:84da10ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1080 r8:8027ecf4 r7:dfd59e60 r6:84db8680 r5:84d70c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd6dfb0 to 0xdfd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99700 INFO: task kworker/1:60:3324 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3326 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3326 tgid:3326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd79d84 r8:00000002 r7:60000113 r6:dfd79d8c r5:84d70000 r4:84d70000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d70000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d70000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d2f8c r4:856d2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d2f8c r4:84da1100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d70000 r8:84da112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1100 r8:8027ecf4 r7:dfd59e60 r6:84db8700 r5:84d70000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d997c0 INFO: task kworker/1:61:3326 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3329 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3329 tgid:3329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd91d84 r8:00000002 r7:60000113 r6:dfd91d8c r5:84d71800 r4:84d71800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d71800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d71800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d338c r4:856d3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d338c r4:84da1180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d71800 r8:84da11ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1180 r8:8027ecf4 r7:dfd59e60 r6:84db8780 r5:84d71800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd91fb0 to 0xdfd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99900 INFO: task kworker/1:62:3329 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:3842 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:3842 tgid:3842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:84f3ec00 r4:84f3ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f3ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ed40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c178c r4:850c1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c178c r4:85004c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f3ec00 r8:85004c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004c00 r8:8027ecf4 r7:e06b1e60 r6:85004c80 r5:84f3ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85016a80 INFO: task kworker/1:289:3842 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:3845 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:3845 tgid:3845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06c5d84 r8:00000002 r7:60000113 r6:e06c5d8c r5:85079800 r4:85079800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85079800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85079800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506c78c r4:8506c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506c78c r4:84ffea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85079800 r8:84ffea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea00 r8:8027ecf4 r7:e0669e60 r6:85004d00 r5:85079800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:72:3845 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3850 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3850 tgid:3850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:8507bc00 r4:8507bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8507bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e039f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c378c r4:850c3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c378c r4:84ffeb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507bc00 r8:84ffeb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffeb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffeb00 r8:8027ecf4 r7:e06c5e60 r6:85004f00 r5:8507bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d5fb0 to 0xe06d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6b80 INFO: task kworker/0:74:3850 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:3852 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:3852 tgid:3852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:8507b000 r4:8507b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c038c r4:850c0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c038c r4:85004f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507b000 r8:85004fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004f80 r8:8027ecf4 r7:e06b9e60 r6:85018000 r5:8507b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d1fb0 to 0xe06d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e5c0 INFO: task kworker/1:291:3852 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:3855 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06b5d84 r8:00000002 r7:60000113 r6:e06b5d8c r5:8507c800 r4:8507c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507c800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c078c r4:850c0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c078c r4:85018080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507c800 r8:850180ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018080 r8:8027ecf4 r7:e06b9e60 r6:85018100 r5:8507c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b5fb0 to 0xe06b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e680 INFO: task kworker/1:292:3855 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:3857 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:3857 tgid:3857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0695d84 r8:00000002 r7:60000113 r6:e0695d8c r5:8507d400 r4:8507d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0695e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507d400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c0b8c r4:850c0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c0b8c r4:85018180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507d400 r8:850181ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018180 r8:8027ecf4 r7:e06b9e60 r6:85018200 r5:8507d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0695fb0 to 0xe0695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e780 INFO: task kworker/1:293:3857 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:3859 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:8507e000 r4:8507e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507e000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c0f8c r4:850c0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c0f8c r4:85018280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507e000 r8:850182ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018280 r8:8027ecf4 r7:e06b9e60 r6:85018300 r5:8507e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e900 INFO: task kworker/1:294:3859 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:3860 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06e1d84 r8:00000002 r7:60000013 r6:e06e1d8c r5:8507ec00 r4:8507ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501eb40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c138c r4:850c1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c138c r4:85018380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507ec00 r8:850183ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018380 r8:8027ecf4 r7:e06b9e60 r6:85018400 r5:8507ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501ec80 INFO: task kworker/1:295:3860 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:3863 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:8507a400 r4:8507a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501eec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c1b8c r4:850c1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c1b8c r4:85018480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507a400 r8:850184ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018480 r8:8027ecf4 r7:e06b9e60 r6:85018500 r5:8507a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501ed00 INFO: task kworker/1:296:3863 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings I <> 0 r5:dddced60 r4:85aa7280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7280 r8:8027ecf4 r7:ed0e5e60 r6:85aa7300 r5:84e29800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9bf00 INFO: task kworker/0:649:6659 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d054a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:650:6661 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:650 state:D stack:0 pid:6661 tgid:6661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0f1d84 r8:00000002 r7:60000013 r6:ed0f1d8c r5:84e2a400 r4:84e2a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e2a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a993c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f16f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2478c r4:85a24400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2478c r4:85aa7380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2a400 r8:85aa73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7380 r8:8027ecf4 r7:ed0e5e60 r6:85aa7400 r5:84e2a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f1fb0 to 0xed0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99340 INFO: task kworker/0:650:6661 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:82ac11e4 r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:651:6664 blocked for more than 476 seconds. r5:84e2b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85aa7480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7480 r8:8027ecf4 r7:ed0f1e60 r6:85aa7500 r5:84e2b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0e1fb0 to 0xed0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99380 INFO: task kworker/0:651:6664 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d0ff0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:652 state:D stack:0 pid:6666 tgid:6666 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84e2c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a24b8c r4:85a24800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a24b8c r4:85aa7580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2c800 r8:85aa75ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7580 r8:8027ecf4 r7:ed0e1e60 r6:85aa7600 r5:84e2c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0e9fb0 to 0xed0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a994c0 INFO: task kworker/0:652:6666 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d0ff0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84e2bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99cc0 r7:dddced40 r6:83018000 r5:85a2578c r4:85aa7700 Exception stack(0xed101fb0 to 0xed101ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:654 state:D stack:0 pid:6670 tgid:6670 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858fd400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:858fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2538c r4:85a25000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2538c r4:85aa7800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fd400 r8:85aa782c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7800 r8:8027ecf4 r7:ed101e60 r6:85a9f500 r5:858fd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f9fb0 to 0xed0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99640 INFO: task kworker/0:654:6670 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d136f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:6674 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:6674 tgid:6674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0fdd84 r8:00000002 r7:60000013 r6:ed0fdd8c r5:858fec00 r4:858fec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858fec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0fde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f1cd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:6676 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:6676 tgid:6676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed109d84 r8:00000002 r7:60000113 r6:ed109d8c r5:858e8000 r4:858e8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb785000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2638c r4:85a26000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2638c r4:85aa7900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e8000 r8:85aa792c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7900 r8:8027ecf4 r7:ed0fde60 r6:85a9f600 r5:858e8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed109fb0 to 0xed109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99c00 INFO: task kworker/0:656:6676 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d19bc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:6677 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:6677 tgid:6677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed10dd84 r8:00000002 r7:60000013 r6:ed10dd8c r5:858f5400 r4:858f5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed10de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:00001000 r4:df997000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a25f8c r4:85aa7980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f5400 r8:85aa79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7980 r8:8027ecf4 r7:ed109e60 r6:85a9f680 r5:858f5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed10dfb0 to 0xed10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99f80 INFO: task kworker/0:657:6677 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d19bc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:658:6680 blocked for more than 476 seconds. r4:84cf0c00 r5:84cf0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed115e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 r4:00000001 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:6683 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:6683 tgid:6683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed105d84 r8:00000002 r7:60000113 r6:ed105d8c r5:84e2e000 r4:84e2e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e2e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed105e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec823000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26f8c r4:85a26c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a26f8c r4:85aa7a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2e000 r8:85aa7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7a80 r8:8027ecf4 r7:ed115e60 r6:85aa7b00 r5:84e2e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed105fb0 to 0xed105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e280 INFO: task kworker/0:659:6683 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d1ab4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:6684 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:6684 tgid:6684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed121d84 r8:00000002 r7:60000013 r6:ed121d8c r5:84cf1800 r4:84cf1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed121e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf1800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec65d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26b8c r4:85a26800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a26b8c r4:85aa7b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf1800 r8:85aa7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7b80 r8:8027ecf4 r7:ed105e60 r6:85a9f780 r5:84cf1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed121fb0 to 0xed121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e100 INFO: task kworker/0:660:6684 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d208a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:6686 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:6686 tgid:6686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed129d84 r8:00000002 r7:60000113 r6:ed129d8c r5:84cf2400 r4:84cf2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed129e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf2400 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a27b8c r4:85a27800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a27b8c r4:85aa7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf2400 r8:85aa7c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7c00 r8:8027ecf4 r7:ed105e60 r6:85a9f800 r5:84cf2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed129fb0 to 0xed129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e2c0 INFO: task kworker/0:661:6686 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d208a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:6687 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:6687 tgid:6687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed12dd84 r8:00000002 r7:60000013 r6:ed12dd8c r5:84cf3000 r4:84cf3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed12de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2738c r4:85a27000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2738c r4:85aa7c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf3000 r8:85aa7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7c80 r8:8027ecf4 r7:ed129e60 r6:85a9f880 r5:84cf3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed12dfb0 to 0xed12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e2c0 INFO: task kworker/0:662:6687 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d237a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:6689 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:6689 tgid:6689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed119d84 r8:00000002 r7:60000113 r6:ed119d8c r5:84e2ec00 r4:84e2ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e2ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed119e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2778c r4:85a27400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2778c r4:85aa7d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2ec00 r8:85aa7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7d00 r8:8027ecf4 r7:ed129e60 r6:85aa7d80 r5:84e2ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed119fb0 to 0xed119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e400 INFO: task kworker/0:663:6689 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d23ca000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:6692 blocked for more than 477 seconds. r4:84e2d400 r5:84e2d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed131e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9eb80 r5:00001000 r4:ecab7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c78c r4:85b5c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5c78c r4:85aa7e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2d400 r8:85aa7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7e00 r8:8027ecf4 r7:ed129e60 r6:85aa7e80 r5:84e2d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed131fb0 to 0xed131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e680 INFO: task kworker/0:664:6692 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d23ca000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e28c00 r5:84e28c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed135e08 r4:00000000 r5:00001000 r4:eca59000 r5:85a27f8c r4:85a27c00 r7:dddced40 r6:83018000 r5:85a27f8c r4:85aa7f00 r4:00000001 Exception stack(0xed135fb0 to 0xed135ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d2903000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:666:6695 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:666 state:D stack:0 pid:6695 tgid:6695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed111d84 r8:00000002 r7:60000113 r6:ed111d8c r5:85ace000 r4:85ace000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ace000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ace000 r7:00000000 r6:83018000 r5:00001000 r4:7f175000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca8f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c38c r4:85b5c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5c38c r4:85aa7680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ace000 r8:85aa76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7680 r8:8027ecf4 r7:ed131e60 r6:85b24000 r5:85ace000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e800 INFO: task kworker/0:666:6695 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d2a99000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:6698 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:6698 tgid:6698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed13dd84 r8:00000002 r7:60000113 r6:ed13dd8c r5:85acc800 r4:85acc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85acc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed13de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85acc800 r7:00000000 r6:83018000 r5:00001000 r4:7f17b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5cb8c r4:85b5c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5cb8c r4:85b24080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85acc800 r8:85b240ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24080 r8:8027ecf4 r7:ed131e60 r6:85b24100 r5:85acc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed13dfb0 to 0xed13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9eb40 INFO: task kworker/0:667:6698 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d2a99000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85350000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85350000 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 r4:85b24180 Exception stack(0xed145fb0 to 0xed145ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85350c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed149e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85350c00 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5d78c r4:85b5d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5d78c r4:85b24280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85350c00 r8:85b242ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24280 r8:8027ecf4 r7:ed145e60 r6:85b24300 r5:85350c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed149fb0 to 0xed149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99740 INFO: task kworker/0:669:6703 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85351800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r9:83018005 r8:85351800 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 r10:61c88647 r9:85351800 r8:85b243ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d3352000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:6707 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:6707 tgid:6707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed14dd84 r8:00000002 r7:60000113 r6:ed14dd8c r5:85352400 r4:85352400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85352400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed14de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85352400 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5db8c r4:85b5d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5db8c r4:85b24480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85352400 r8:85b244ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24480 r8:8027ecf4 r7:ed149e60 r6:85b24500 r5:85352400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed14dfb0 to 0xed14dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85b2d280 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:00000000 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:6708 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:672 state:D stack:0 pid:6708 tgid:6708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed155d84 r8:00000002 r7:60000013 r6:ed155d8c r5:85353000 r4:85353000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85353000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed155e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85353000 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5df8c r4:85b5dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5df8c r4:85b24580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85353000 r8:85b245ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24580 r8:8027ecf4 r7:ed14de60 r6:85b24600 r5:85353000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed155fb0 to 0xed155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2d100 INFO: task kworker/0:672:6708 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d39a4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:673:6710 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:6710 tgid:6710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed159d84 r8:00000002 r7:60000113 r6:ed159d8c r5:85353c00 r4:85353c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85353c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed159e08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85353c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e38c r4:85b5e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5e38c r4:85b24680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85353c00 r8:85b246ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24680 r8:8027ecf4 r7:ed155e60 r6:85b24700 r5:85353c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed159fb0 to 0xed159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2d300 INFO: task kworker/0:673:6710 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d39a4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:6711 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:674 state:D stack:0 pid:6711 tgid:6711 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85355400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed151e08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85355400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 r5:85b5f78c r4:85b5f400 r10:61c88647 r9:85355400 r8:85b247ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d3ce6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:6714 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:6714 tgid:6714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed165d84 r8:00000002 r7:60000013 r6:ed165d8c r5:85354800 r4:85354800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85354800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85354800 r7:00000000 r6:83018000 r5:00001000 r4:7f191000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b24880 r8:8027ecf4 r7:ed151e60 r6:85b24900 r5:85354800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:00000000 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:6717 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:6717 tgid:6717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed161d84 r8:00000002 r7:60000113 r6:ed161d8c r5:85356c00 r4:85356c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85356c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85356c00 r7:00000000 r6:83018000 r5:00001000 r4:7f193000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5eb8c r4:85b5e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5eb8c r4:85b24980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85356c00 r8:85b249ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24980 r8:8027ecf4 r7:ed151e60 r6:85b24a00 r5:85356c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed161fb0 to 0xed161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2d940 INFO: task kworker/0:676:6717 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d4220000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:677 state:D stack:0 pid:6718 tgid:6718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed15dd84 r8:00000002 r7:60000013 r6:ed15dd8c r5:85ae0000 r4:85ae0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed15de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2da40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae0000 r7:00000000 r6:83018000 r5:00001000 r4:7f197000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece31000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ef8c r4:85b5ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5ef8c r4:85b24a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae0000 r8:85b24aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24a80 r8:8027ecf4 r7:ed151e60 r6:85b24b00 r5:85ae0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed15dfb0 to 0xed15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2da80 INFO: task kworker/0:677:6718 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d455e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:84cf3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed169e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84cf3c00 r8:85b24bac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:678:6720 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84cf5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84cf5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 r5:85b5fb8c r4:85b5f800 r7:dddced40 r6:83018000 r5:85b5fb8c r4:85b24c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2df00 INFO: task kworker/0:679:6725 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d4744000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:6727 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:6727 tgid:6727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84cf6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r9:83018005 r8:84cf6000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 r4:85b24c80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:681 state:D stack:0 pid:6729 tgid:6729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed179d84 r8:00000002 r7:60000013 r6:ed179d8c r5:84cf6c00 r4:84cf6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed179e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba038c r4:85ba0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba038c r4:85b24d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf6c00 r8:85b24d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24d00 r8:8027ecf4 r7:ed175e60 r6:85a9fa80 r5:84cf6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed179fb0 to 0xed179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31100 INFO: task kworker/0:681:6729 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d4dab000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:682 state:D stack:0 pid:6732 tgid:6732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84cf0000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed171e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf0000 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba0b8c r4:85ba0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba0b8c r4:85b24d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf0000 r8:85b24dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24d80 r8:8027ecf4 r7:ed179e60 r6:85a9fb00 r5:84cf0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed171fb0 to 0xed171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85b312c0 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:6733 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:6733 tgid:6733 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84cf4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed181fb0 to 0xed181ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:684 state:D stack:0 pid:6737 tgid:6737 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b60000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed17de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85b24e80 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31600 INFO: task kworker/0:684:6737 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d56ee000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:6739 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:6739 tgid:6739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed18dd84 r8:00000002 r7:60000013 r6:ed18dd8c r5:85b61800 r4:85b61800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b61800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed18de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed18dfb0 to 0xed18dff8) INFO: task kworker/0:685:6739 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:686 state:D stack:0 pid:6741 tgid:6741 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b63000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24f80 r8:8027ecf4 r7:ed18de60 r6:85a9fd00 r5:85b63000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed195fb0 to 0xed195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31b00 INFO: task kworker/0:686:6741 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d60ca000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:6743 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:6743 tgid:6743 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85b63c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed19de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba178c r4:85ba1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba178c r4:85b33000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b63c00 r8:85b3302c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33000 r8:8027ecf4 r7:ed18de60 r6:85a9fd80 r5:85b63c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed19dfb0 to 0xed19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31800 INFO: task kworker/0:687:6743 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d62ae000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:6744 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:6744 tgid:6744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1a1d84 r8:00000002 r7:60000013 r6:ed1a1d8c r5:85b62400 r4:85b62400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b62400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b62400 r7:00000000 r6:83018000 r5:00001000 r4:7f1d3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba1b8c r4:85ba1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba1b8c r4:85b33080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b62400 r8:85b330ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33080 r8:8027ecf4 r7:ed18de60 r6:85a9fe00 r5:85b62400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a1fb0 to 0xed1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31800 INFO: task kworker/0:688:6744 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d62ae000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:6746 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:6746 tgid:6746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1a9d84 r8:00000002 r7:60000113 r6:ed1a9d8c r5:85b60c00 r4:85b60c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b60c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b60c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba1f8c r4:85ba1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba1f8c r4:85b33100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b60c00 r8:85b3312c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33100 r8:8027ecf4 r7:ed18de60 r6:85a9fe80 r5:85b60c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a9fb0 to 0xed1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31b40 INFO: task kworker/0:689:6746 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d67d8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:6749 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:6749 tgid:6749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1add84 r8:00000002 r7:60000013 r6:ed1add8c r5:85b65400 r4:85b65400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b65400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b65400 r7:00000000 r6:83018000 r5:00001000 r4:7f1d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba278c r4:85ba2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba278c r4:85b33180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b65400 r8:85b331ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33180 r8:8027ecf4 r7:ed18de60 r6:85a9ff00 r5:85b65400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1adfb0 to 0xed1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31d80 INFO: task kworker/0:690:6749 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d67d8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:6750 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:6750 tgid:6750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1b1d84 r8:00000002 r7:60000113 r6:ed1b1d8c r5:85b66000 r4:85b66000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b66000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b66000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebded000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba378c r4:85ba3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba378c r4:85b33200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b66000 r8:85b3322c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33200 r8:8027ecf4 r7:ed1ade60 r6:85a9ff80 r5:85b66000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b1fb0 to 0xed1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31f00 INFO: task kworker/0:691:6750 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d6930000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:6754 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:6754 tgid:6754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed185d84 r8:00000002 r7:60000013 r6:ed185d8c r5:85b66c00 r4:85b66c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b66c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed185e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9be40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba2b8c r4:85ba2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba2b8c r4:85b33280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b66c00 r8:85b332ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33280 r8:8027ecf4 r7:ed1b1e60 r6:85b3c000 r5:85b66c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b311c0 INFO: task kworker/0:692:6754 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d6930000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:6756 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:6756 tgid:6756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed189d84 r8:00000002 r7:60000113 r6:ed189d8c r5:85b64800 r4:85b64800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b64800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed189e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b64800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba2f8c r4:85ba2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba2f8c r4:85b33300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b64800 r8:85b3332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33300 r8:8027ecf4 r7:ed1b1e60 r6:85b3c080 r5:85b64800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed189fb0 to 0xed189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a654c0 INFO: task kworker/0:693:6756 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7009000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:6759 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:6759 tgid:6759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed025d84 r8:00000002 r7:60000113 r6:ed025d8c r5:85b68c00 r4:85b68c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b68c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba338c r4:85ba3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba338c r4:85b33380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b68c00 r8:85b333ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33380 r8:8027ecf4 r7:ed1b1e60 r6:85b3c100 r5:85b68c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed025fb0 to 0xed025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c140 INFO: task kworker/0:694:6759 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d71bf000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:6762 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:6762 tgid:6762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85b6a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:696:6763 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:696 state:D stack:0 pid:6763 tgid:6763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1b9d84 r8:00000002 r7:60000013 r6:ed1b9d8c r5:85b69800 r4:85b69800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b69800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b69800 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba3b8c r4:85ba3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba3b8c r4:85b33480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b69800 r8:85b334ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33480 r8:8027ecf4 r7:ed1b5e60 r6:85b3c200 r5:85b69800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b9fb0 to 0xed1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c5c0 INFO: task kworker/0:696:6763 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7688000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 r4:00000000 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85b68000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b68000 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba3f8c r4:85ba3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba3f8c r4:85b33500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b68000 r8:85b3352c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33500 r8:8027ecf4 r7:ed1b5e60 r6:85b3c280 r5:85b68000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c400 INFO: task kworker/0:697:6765 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7688000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:6767 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:6767 tgid:6767 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b6c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f127000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba438c r4:85ba4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba438c r4:85b33580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6c800 r8:85b335ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33580 r8:8027ecf4 r7:ed1b5e60 r6:85b3c300 r5:85b6c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c9fb0 to 0xed1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c880 INFO: task kworker/0:698:6767 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d786b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:699:6769 blocked for more than 477 seconds. r5:85ae2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae2400 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba478c r4:85ba4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba478c r4:85b33600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae2400 r8:85b3362c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33600 r8:8027ecf4 r7:ed1b5e60 r6:85b33680 r5:85ae2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d9fb0 to 0xec6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c6c0 INFO: task kworker/0:699:6769 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:700:6772 blocked for more than 477 seconds. r5:85ae3000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:85ba4b8c r4:85ba4800 r10:00000000 r9:85b33700 r8:8027ecf4 r7:ed1b5e60 r6:85b33780 r5:85ae3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1cdfb0 to 0xed1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c980 INFO: task kworker/0:700:6772 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7c0c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:701:6773 blocked for more than 477 seconds. r5:85ae3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85ba538c r4:85ba5000 r4:85b33800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85ae4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae4800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba5b8c r4:85ba5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba5b8c r4:85b33900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae4800 r8:85b3392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33900 r8:8027ecf4 r7:ed1d5e60 r6:85b33980 r5:85ae4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d9fb0 to 0xed1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2cd00 INFO: task kworker/0:702:6776 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8108000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:703 state:D stack:0 pid:6778 tgid:6778 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85ae5400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1dde08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85ae5400 r8:85b33a2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:6780 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:6780 tgid:6780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1e1d84 r8:00000002 r7:60000113 r6:ed1e1d8c r5:85ae6000 r4:85ae6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b471c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae6000 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba5f8c r4:85ba5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba5f8c r4:85b33b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae6000 r8:85b33b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33b00 r8:8027ecf4 r7:ed1d9e60 r6:85b33b80 r5:85ae6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e1fb0 to 0xed1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b47300 INFO: task kworker/0:704:6780 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:705:6782 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:705 state:D stack:0 pid:6782 tgid:6782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1e5d84 r8:00000002 r7:60000113 r6:ed1e5d8c r5:85ae6c00 r4:85ae6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba638c r4:85ba6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba638c r4:85b33c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae6c00 r8:85b33c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33c00 r8:8027ecf4 r7:ed1e1e60 r6:85b33c80 r5:85ae6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e5fb0 to 0xed1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b47180 INFO: task kworker/0:705:6782 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8722000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:6784 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85ae1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e9e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85ba678c r4:85ba6400 r7:dddced40 r6:83018000 r5:85ba678c r4:85b33d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85b47340 INFO: task kworker/0:706:6784 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d886e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:6786 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:6786 tgid:6786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1edd84 r8:00000002 r7:60000113 r6:ed1edd8c r5:85ae0c00 r4:85ae0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85356000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b479c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85356000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba738c r4:85ba7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba738c r4:85b33f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85356000 r8:85b33f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33f00 r8:8027ecf4 r7:ed1ede60 r6:85b33f80 r5:85356000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f1fb0 to 0xed1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b475c0 INFO: task kworker/0:708:6788 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8b81000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:709:6791 blocked for more than 478 seconds. r4:85368000 r5:85368000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85bac38c r4:85bac000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:709:6791 is blocked on a mutex likely owned by task kworker/1:290:3848. dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536a400 r5:8536a400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed201e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536a400 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba7b8c r4:85ba7800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba7b8c r4:85b53100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536a400 r8:85b5312c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53100 r8:8027ecf4 r7:ed1f5e60 r6:85b53180 r5:8536a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed201fb0 to 0xed201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b47d80 INFO: task kworker/0:710:6796 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8e45000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85369800 r5:85369800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85369800 r8:85b5322c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xed1fdfb0 to 0xed1fdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:6799 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:6799 tgid:6799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed209d84 r8:00000002 r7:60000113 r6:ed209d8c r5:85368c00 r4:85368c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85368c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed209e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85368c00 r7:00000000 r6:83018000 r5:00001000 r4:7f171000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bac78c r4:85bac400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bac78c r4:85b53300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85368c00 r8:85b5332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53300 r8:8027ecf4 r7:ed1f5e60 r6:85b53380 r5:85368c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed209fb0 to 0xed209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54080 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8536bc00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed205fb0 to 0xed205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54200 INFO: task kworker/0:713:6803 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d9991000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:6805 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:6805 tgid:6805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed20dd84 r8:00000002 r7:60000113 r6:ed20dd8c r5:8536c800 r4:8536c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed20de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8536c800 r8:85b5352c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 task:kworker/0:715 state:D stack:0 pid:6806 tgid:6806 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829189c0 r9:ed1f9d84 r8:00000002 r7:60000113 r6:ed1f9d8c r5:8536d400 r4:8536d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bacf8c r4:85bacc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bacf8c r4:85b53600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536d400 r8:85b5362c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53600 r8:8027ecf4 r7:ed20de60 r6:85b53680 r5:8536d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f9fb0 to 0xed1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54340 INFO: task kworker/0:715:6806 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d9b8e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r4:8536e000 r5:8536e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed215e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bad78c r4:85bad400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bad78c r4:85b53700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536e000 r8:85b5372c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xed215fb0 to 0xed215ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 r10:829189c0 r9:ed211d84 r8:00000002 r7:60000013 r6:ed211d8c r5:8536ec00 r5:8536ec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed211e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8536ec00 r8:85b5382c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:6812 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:6812 tgid:6812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed21dd84 r8:00000002 r7:60000113 r6:ed21dd8c r5:8536b000 r4:8536b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed21de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85badb8c r4:85bad800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85badb8c r4:85b53900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536b000 r8:85b5392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53900 r8:8027ecf4 r7:ed211e60 r6:85b53980 r5:8536b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed221d84 r8:00000002 r7:60000113 r6:ed221d8c r5:83ad8000 r4:83ad8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed221e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3a500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad8000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed02f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85baeb8c r4:85bae800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85baeb8c r4:85b53a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:85b53a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53a00 r8:8027ecf4 r7:ed211e60 r6:85b53a80 r5:83ad8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed221fb0 to 0xed221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54ac0 INFO: task kworker/0:719:6814 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: da2aa000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:83ad8c00 r4:829189bc r4:00000000 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83ad8c00 r8:85b53b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:6818 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:6818 tgid:6818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed219d84 r8:00000002 r7:60000113 r6:ed219d8c r5:83ad9800 r4:83ad9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed219e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad9800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ed000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed019000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bae78c r4:85bae400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bae78c r4:85b53c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad9800 r8:85b53c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53c00 r8:8027ecf4 r7:ed221e60 r6:85b53c80 r5:83ad9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed219fb0 to 0xed219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54dc0 INFO: task kworker/0:721:6818 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dac3a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:83ada400 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:83ada400 r8:85b53d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dac3a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:6822 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:6822 tgid:6822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed22dd84 r8:00000002 r7:60000113 r6:ed22dd8c r5:83adb000 r4:83adb000 r5:83adb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85b53e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53e00 r8:8027ecf4 r7:ed229e60 r6:85b53e80 r5:83adb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed22dfb0 to 0xed22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104100 INFO: task kworker/0:723:6822 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db002000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:8501e100 task:kworker/0:724 state:D stack:0 pid:6824 tgid:6824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83adbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed231fb0 to 0xed231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104200 INFO: task kworker/0:724:6824 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db002000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:6826 blocked for more than 478 seconds. task:kworker/0:725 state:D stack:0 pid:6826 tgid:6826 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83adc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85bafb8c r4:85baf800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:725:6826 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:83add400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83add400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85baff8c r4:85bafc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85baff8c r4:85465100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83add400 r8:8546512c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465100 r8:8027ecf4 r7:ed239e60 r6:85465180 r5:83add400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed23dfb0 to 0xed23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104500 INFO: task kworker/0:726:6828 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db7a8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:727 state:D stack:0 pid:6829 tgid:6829 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83ade000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed235e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:83adec00 r5:83adec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed241e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83adec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb878c r4:85bb8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb878c r4:85465300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:8546532c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465300 r8:8027ecf4 r7:ed235e60 r6:85465380 r5:83adec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed241fb0 to 0xed241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104800 INFO: task kworker/0:728:6832 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db83d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:6834 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:6834 tgid:6834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed255d84 r8:00000002 r7:60000013 r6:ed255d8c r5:85be8000 r4:85be8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85be8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed255e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be8000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb8b8c r4:85bb8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb8b8c r4:85465400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be8000 r8:8546542c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465400 r8:8027ecf4 r7:ed241e60 r6:85465480 r5:85be8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed255fb0 to 0xed255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed249d84 r8:00000002 r7:60000113 r6:ed249d8c r5:85be9800 r4:85be9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85be9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed249e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb8f8c r4:85bb8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb8f8c r4:85465500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be9800 r8:8546552c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465500 r8:8027ecf4 r7:ed255e60 r6:85465580 r5:85be9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed249fb0 to 0xed249ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104b00 INFO: task kworker/0:730:6836 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dbe72000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85beb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed25de08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85beb000 r8:8546562c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:731:6838 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:6840 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:6840 tgid:6840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed261d84 r8:00000002 r7:60000013 r6:ed261d8c r5:85b6bc00 r4:85b6bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b6bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed261e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b6bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec835000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb938c r4:85bb9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb938c r4:85465700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6bc00 r8:8546572c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465700 r8:8027ecf4 r7:ed25de60 r6:85b3c380 r5:85b6bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed261fb0 to 0xed261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104bc0 INFO: task kworker/0:732:6840 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc1c3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:733 state:D stack:0 pid:6842 tgid:6842 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b6ec00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85465780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 800f0113 ffffffff r4:00000000 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:85b6e000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b6e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb9f8c r4:85bb9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb9f8c r4:85465880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6e000 r8:854658ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465880 r8:8027ecf4 r7:ed269e60 r6:85b3c480 r5:85b6e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed271fb0 to 0xed271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533140 INFO: task kworker/0:734:6844 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc4b3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:6846 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:6846 tgid:6846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed279d84 r8:00000002 r7:60000113 r6:ed279d8c r5:85360000 r4:85360000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85360000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed279e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85360000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bba38c r4:85bba000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bba38c r4:85465800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85360000 r8:8546582c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465800 r8:8027ecf4 r7:ed271e60 r6:85b3c500 r5:85360000 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85360c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc8b2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:6849 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:6849 tgid:6849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed285d84 r8:00000002 r7:60000013 r6:ed285d8c r5:85362400 r4:85362400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85362400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed285e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85362400 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bba78c r4:85bba400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bba78c r4:85465980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85362400 r8:854659ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465980 r8:8027ecf4 r7:ed27de60 r6:85b3c600 r5:85362400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed285fb0 to 0xed285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533440 INFO: task kworker/0:737:6849 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc8b2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:738:6851 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:738 state:D stack:0 pid:6851 tgid:6851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed259d84 r8:00000002 r7:60000113 r6:ed259d8c r5:85363000 r4:85363000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85363000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed259e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85363000 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bbaf8c r4:85bbac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bbaf8c r4:85465a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85363000 r8:85465a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465a00 r8:8027ecf4 r7:ed27de60 r6:85b3c680 r5:85363000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed259fb0 to 0xed259ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dca62000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:6858 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:6858 tgid:6858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed281d84 r8:00000002 r7:60000013 r6:ed281d8c r5:85363c00 r4:85363c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85363c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed281e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85363c00 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece55000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bbb38c r4:85bbb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bbb38c r4:85465a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85363c00 r8:85465aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465a80 r8:8027ecf4 r7:ed259e60 r6:85b3c700 r5:85363c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed281fb0 to 0xed281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533a40 INFO: task kworker/0:739:6858 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dcdd7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:740 state:D stack:0 pid:6860 tgid:6860 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85364800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed265e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:741:6861 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:741 state:D stack:0 pid:6861 tgid:6861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed291d84 r8:00000002 r7:60000113 r6:ed291d8c r5:85365400 r4:85365400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85365400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed291e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85365400 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece7f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bbb78c r4:85bbb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bbb78c r4:85465b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85365400 r8:85465bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465b80 r8:8027ecf4 r7:ed265e60 r6:85b3c800 r5:85365400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed291fb0 to 0xed291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533d80 INFO: task kworker/0:741:6861 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dd34f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85366c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed299e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85366c00 r8:85465c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84533d80 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85b6b000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf51000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc038c r4:85bc0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc038c r4:85465c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6b000 r8:85465cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465c80 r8:8027ecf4 r7:ed299e60 r6:85b3c900 r5:85b6b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a1fb0 to 0xed2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533f00 INFO: task kworker/0:743:6866 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dd7c4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:6868 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:6868 tgid:6868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2a9d84 r8:00000002 r7:60000013 r6:ed2a9d8c r5:85361800 r4:85361800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85361800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e540 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85361800 r8:85465d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465d00 r8:8027ecf4 r7:ed2a1e60 r6:85b3c980 r5:85361800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a9fb0 to 0xed2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e080 INFO: task kworker/0:744:6868 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ddc0f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85366000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2ade08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85bc078c r4:85bc0400 r10:61c88647 r9:85366000 r8:85465dac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:746 state:D stack:0 pid:6871 tgid:6871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b70c00 r4:829189bc r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ddf81000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:6873 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:6873 tgid:6873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2bdd84 r8:00000002 r7:60000113 r6:ed2bdd8c r5:85b70000 r4:85b70000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b70000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b70000 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc0f8c r4:85bc0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc0f8c r4:85465e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b70000 r8:85465eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465e80 r8:8027ecf4 r7:ed2a9e60 r6:85b3cb00 r5:85b70000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2bdfb0 to 0xed2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e180 INFO: task kworker/0:747:6873 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: de259000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:6875 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:6875 tgid:6875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2c5d84 r8:00000002 r7:60000013 r6:ed2c5d8c r5:85b71800 r4:85b71800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b71800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b71800 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc138c r4:85bc1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc138c r4:85465f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b71800 r8:85465f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465f00 r8:8027ecf4 r7:ed2a9e60 r6:85b3cb80 r5:85b71800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c5fb0 to 0xed2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e5c0 INFO: task kworker/0:748:6875 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: de259000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:6878 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:6878 tgid:6878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2cdd84 r8:00000002 r7:60000013 r6:ed2cdd8c r5:85b73000 r4:85b73000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b73000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2cde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520eb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b73000 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed251000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc278c r4:85bc2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc278c r4:85465f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b73000 r8:85465fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465f80 r8:8027ecf4 r7:ed2a9e60 r6:85b3cc00 r5:85b73000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2cdfb0 to 0xed2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e440 INFO: task kworker/0:749:6878 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: de4fe000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:6880 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:6880 tgid:6880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2d1d84 r8:00000002 r7:60000013 r6:ed2d1d8c r5:85b72400 r4:85b72400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b72400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85b72400 r8:8551802c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 Call trace: r5:85b74800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85518080 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:751:6882 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dea6d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:6887 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:6887 tgid:6887 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b75400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:6889 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:6889 tgid:6889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2ddd84 r8:00000002 r7:60000013 r6:ed2ddd8c r5:85b76c00 r4:85b76c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b76c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ec40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc2b8c r4:85bc2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc2b8c r4:85518180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b76c00 r8:855181ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85518180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518180 r8:8027ecf4 r7:ed2cde60 r6:85b3ce00 r5:85b76c00 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:754 state:D stack:0 pid:6891 tgid:6891 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85bed400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2d9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85bed400 r8:8551822c r7:82804d40 r6:dddced40 r5:dddced60 r4:8520ec80 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85bee000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2fde08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bee000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc2f8c r4:85bc2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc2f8c r4:85518300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bee000 r8:8551832c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518300 r8:8027ecf4 r7:ed2d9e60 r6:85518380 r5:85bee000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2fdfb0 to 0xed2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520ee40 INFO: task kworker/0:755:6894 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: df6f6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:6896 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:6896 tgid:6896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed30dd84 r8:00000002 r7:60000113 r6:ed30dd8c r5:85bea400 r4:85bea400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bea400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed30de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533f00 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc338c r4:85bc3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc338c r4:85518400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bea400 r8:8551842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518400 r8:8027ecf4 r7:ed2d9e60 r6:85518480 r5:85bea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed30dfb0 to 0xed30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e800 INFO: task kworker/0:756:6896 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: df6f6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:757 state:D stack:0 pid:6899 tgid:6899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed055d84 r8:00000002 r7:60000113 r6:ed055d8c r5:85bec800 r4:85bec800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bec800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855171c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bec800 r7:00000000 r6:83018000 r5:00001000 r4:7f1fd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed305000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85bec800 r8:8551852c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85bebc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc3f8c r4:85bc3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc3f8c r4:85518600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bebc00 r8:8551862c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518600 r8:8027ecf4 r7:ed2d9e60 r6:85518680 r5:85bebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed309fb0 to 0xed309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85517640 INFO: task kworker/0:758:6904 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: df8fd000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85be8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85bc438c r4:85bc4000 r10:61c88647 r9:85be8c00 r8:8551872c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:760:6906 blocked for more than 479 seconds. r5:85beec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85518800 r8:8027ecf4 r7:ed295e60 r6:85518880 r5:85beec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed319fb0 to 0xed319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85517640 INFO: task kworker/0:760:6906 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dffb6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:6907 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:6907 tgid:6907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed31dd84 r8:00000002 r7:60000013 r6:ed31dd8c r5:85490000 r4:85490000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85490000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed31de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85490000 r7:00000000 r6:83018000 r5:00001000 r4:7f203000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec83d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85518900 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e041d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85490c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed315e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85490c00 r8:85518a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517e40 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85492400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:6984 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:6984 tgid:6984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed405d84 r8:00000002 r7:60000013 r6:ed405d8c r5:85496c00 r4:85496c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85496c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed405e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8da40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85496c00 r7:00000000 r6:83018000 r5:00001000 r4:7f205000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc5f8c r4:85bc5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc5f8c r4:85518c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496c00 r8:85518c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518c00 r8:8027ecf4 r7:ed345e60 r6:85518c80 r5:85496c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed405fb0 to 0xed405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a8de80 INFO: task kworker/0:764:6984 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e081b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85494800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85494800 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc6b8c r4:85bc6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc6b8c r4:85518d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85494800 r8:85518d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518d00 r8:8027ecf4 r7:ed345e60 r6:85518d80 r5:85494800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Not tainted 6.15.0-syzkaller #0 r5:85496000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517c00 r5:85bc678c r4:85bc6400 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:6991 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:6991 tgid:6991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed42dd84 r8:00000002 r7:60000113 r6:ed42dd8c r5:85493000 r4:85493000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85493000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed42de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85493000 r7:00000000 r6:83018000 r5:00001000 r4:7f20d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb37000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc6f8c r4:85bc6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc6f8c r4:85518f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493000 r8:85518f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518f00 r8:8027ecf4 r7:ed425e60 r6:85518f80 r5:85493000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed42dfb0 to 0xed42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e0c0 INFO: task kworker/0:767:6991 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 dd20: e0e37000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:768 state:D stack:0 pid:6993 tgid:6993 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85493c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e2c0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb73000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc738c r4:85bc7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc738c r4:85a73000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493c00 r8:85a7302c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73000 r8:8027ecf4 r7:ed42de60 r6:85a73080 r5:85493c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed435fb0 to 0xed435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e1c0 INFO: task kworker/0:768:6993 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e1232000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:85491800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85bc778c r4:85a73100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85491800 r8:85a7312c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73100 r8:8027ecf4 r7:ed435e60 r6:85a73180 r5:85491800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed439fb0 to 0xed439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e300 INFO: task kworker/0:769:6995 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/0:770:6998 blocked for more than 479 seconds. r5:85495400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85bc7b8c r4:85bc7800 r10:00000000 r9:85a73200 r8:8027ecf4 r7:ed439e60 r6:85a73280 r5:85495400 INFO: task kworker/0:770:6998 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 task:kworker/0:771 state:D stack:0 pid:7000 tgid:7000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed431d84 r8:00000002 r7:60000013 r6:ed431d8c r5:85410c00 r4:85410c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85410c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed431e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6eb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0eb8c r4:84c0e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0eb8c r4:85a73300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85410c00 r8:85a7332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73300 r8:8027ecf4 r7:ed43de60 r6:85a73380 r5:85410c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed431fb0 to 0xed431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e580 INFO: task kworker/0:771:7000 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e1b10000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b76000 r5:85b76000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84c0ef8c r4:84c0ec00 r10:61c88647 r9:85b76000 r8:85a7342c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a6e580 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:773 state:D stack:0 pid:7005 tgid:7005 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b78c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84c0e78c r4:84c0e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0e78c r4:85a73480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b78c00 r8:85a734ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73480 r8:8027ecf4 r7:ed431e60 r6:85a83000 r5:85b78c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed451fb0 to 0xed451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6ebc0 INFO: task kworker/0:773:7005 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e2033000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 task:kworker/0:774 state:D stack:0 pid:7007 tgid:7007 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b78000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e264d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:7008 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:7008 tgid:7008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:ed449d84 r8:00000002 r7:60000113 r6:ed449d8c r5:85410000 r5:85410000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85a73580 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:776 state:D stack:0 pid:7011 tgid:7011 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85412400 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e28d0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:7012 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:7012 tgid:7012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed441d84 r8:00000002 r7:60000113 r6:ed441d8c r5:85413000 r4:85413000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85413000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed441e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a93000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85413c00 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85c68f8c r4:85a73880 Exception stack(0xed461fb0 to 0xed461ff8) Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed471d84 r8:00000002 r7:60000013 r6:ed471d8c r5:85b7b000 r4:85b7b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b7b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed471e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a93280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f22b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)